{"vuid":"VU#219140","idnumber":"219140","name":"WS_FTP Server vulnerable to buffer overflow when supplied overly long \"STAT\" command","keywords":["WS_FTP Server","buffer overflow","long string of characters","STAT command"],"overview":"It has been reported that a vulnerability exists in the processing of a \"STAT\" command on WS_FTP Servers versions 4.x and prior. Exploitation of this vulnerability may lead to an authenticated user executing arbitrary code with the elevated privileges of the server process.","clean_desc":"WS_FTP Server is a File Transfer Protocol server. A buffer overflow vulnerability has been reported in code that processes the \"STAT\" command (status). WS_FTP Servers versions 3.00, 4.00, 4.01 are vulnerable to this issue.","impact":"Access the server is required prior to exploitation of this vulnerability. Exploitation of this vulnerability may lead to an authenticated user executing arbitrary code with the elevated privileges of the server process. If the server is setup to permit anonymous access, then authentication is not a requirement for exploitation.","resolution":"A patch was released for  WS_FTP server 3.0 and is resolved in version 3.14. ftp://ftp.ipswitch.com/ipswitch/product_support/WS_FTP_Server/ifs314.exe A patch was released for  WS_FTP server 4.00 and 4.01 and is resolved in version 4.02. ftp://ftp.ipswitch.com/ipswitch/product_support/ws_ftp_server/ifs402.exe","workarounds":"Disable anonymous FTP access\nAlthough disabling anonymous FTP access does not prevent attacks from occurring, it does prevent unauthenticated users from attempting to exploit the vulnerability.","sysaffected":"","thanks":"Thanks to Secunia Security Advisories for reporting this vulnerability.","author":"This document was written by Jason A Rafail.","public":["http://www.secunia.com/advisories/9671/","ftp://ftp.ipswitch.com/ipswitch/product_support/ws_ftp_server/ifs402.exe"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-09-04T18:06:04Z","publicdate":"2003-09-04T00:00:00Z","datefirstpublished":"2003-09-22T14:29:57Z","dateupdated":"2003-09-22T14:30:24Z","revision":5,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"20","cam_easeofexploitation":"14","cam_attackeraccessrequired":"10","cam_scorecurrent":"10.5","cam_scorecurrentwidelyknown":"13.125","cam_scorecurrentwidelyknownexploited":"23.625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":10.5,"vulnote":null}