Advisory Details

September 26th, 2006

Ipswitch WS_FTP Server Checksum Command Parsing Buffer Overflow Vulnerabilities

ZDI-06-029
ZDI-CAN-078

CVE ID CVE-2006-5000
CVSS SCORE
AFFECTED VENDORS Ipswitch
AFFECTED PRODUCTS WS_FTP
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['4705']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Ipswitch WS_FTP Server. Anonymous access or authentication is required to exploit this vulnerability.

The specific flaw exists due to a lack of bounds checking during the parsing of long string arguments to the 'XCRC', 'XSHA1' and 'XMD5' commands leading to a stack overflow vulnerability. Exploitation requires valid or anonymous FTP server credentials.

ADDITIONAL DETAILS Ipswitch has issued an update to correct this vulnerability. More details can be found at:
http://www.ipswitch.com/support/ws_ftp-server/releases/wr505hf1.asp
DISCLOSURE TIMELINE
  • 2006-09-01 - Vulnerability reported to vendor
  • 2006-09-26 - Coordinated public release of advisory
CREDIT Anonymous
BACK TO ADVISORIES