Plugins Database As of 12-13-2019

WS_FTP SITE CPWD Buffer Overflow

FTP
Impact by CVSS Score
  • ID: 1.3.6.1.4.1.25623.1.0.11098

CVSS Base Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Summary:
This host is running a version of WS_FTP FTP server prior to 3.1.2.

Technical Details:
Versions earlier than 3.1.2 contain an unchecked buffer in routines that handle the 'CPWD' command arguments. The 'CPWD' command allows remote users to change their password. By issuing a malformed argument to the CPWD command, a user could overflow a buffer and execute arbitrary code on this host. Note that a local user account is required.

Recommendations:
The vendor has released a patch that fixes this issue. Please install the latest patch available from the vendor's website.

Detection Type:
Remote Banner

Solution Type:
Vendor Patch

Search
Severity
High
CVSS Score
7.5
Published
2005-11-03 13:08:04
Modified
2019-02-06 12:55:20
CVE
CVE-2002-0826
BID
5427

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.