|
|
|
|
| |
Credit:
The information has been provided by Zero Day Initiative (ZDI).
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-06-029.html
|
| |
Vulnerable Systems:
* Ipswitch WS_FTP Server version 5.04
* Ipswitch WS_FTP Server version 5.05
Immune Systems:
* Ipswitch WS_FTP Server version 5.05 Hotfix 1
The specific flaw exists due to a lack of bounds checking during the parsing of long string arguments to the 'XCRC', 'XSHA1' and 'XMD5' commands leading to a stack overflow vulnerability. Exploitation requires valid or anonymous FTP server credentials.
Vendor Response:
Ipswitch has issued an update, version 5.05 Hotfix 1, to correct this vulnerability. More details can be found at: http://www.ipswitch.com/support/ws_ftp-server/releases/wr505hf1.asp
CVE Information:
CVE-2006-5000
Disclosure Timeline:
2006.09.01 - Vulnerability reported to vendor
2006.09.26 - Digital Vaccine released to TippingPoint customers
2006.09.26 - Public release of advisory
|
|
|
|
|