CVE ID | CVE-2006-5000 |
CVSS SCORE | |
AFFECTED VENDORS |
Ipswitch |
AFFECTED PRODUCTS |
WS_FTP |
TREND MICRO CUSTOMER PROTECTION | Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['4705']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com |
VULNERABILITY DETAILS |
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Ipswitch WS_FTP Server. Anonymous access or authentication is required to exploit this vulnerability. The specific flaw exists due to a lack of bounds checking during the parsing of long string arguments to the 'XCRC', 'XSHA1' and 'XMD5' commands leading to a stack overflow vulnerability. Exploitation requires valid or anonymous FTP server credentials. |
ADDITIONAL DETAILS |
Ipswitch has issued an update to correct this vulnerability. More details can be found at:
http://www.ipswitch.com/support/ws_ftp-server/releases/wr505hf1.asp |
DISCLOSURE TIMELINE |
|
CREDIT | Anonymous |