ID CVE-2004-1848
Summary Ipswitch WS_FTP Server 4.0.2 allows remote attackers to cause a denial of service (disk consumption) and bypass file size restrictions via a REST command with a large size argument, followed by a STOR of a smaller file.
References
Vulnerable Configurations
  • cpe:2.3:a:ipswitch:ws_ftp_server:4.01:*:*:*:*:*:*:*
    cpe:2.3:a:ipswitch:ws_ftp_server:4.01:*:*:*:*:*:*:*
  • cpe:2.3:a:ipswitch:ws_ftp_server:3.0_1:*:*:*:*:*:*:*
    cpe:2.3:a:ipswitch:ws_ftp_server:3.0_1:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ws_ftp_server:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ws_ftp_server:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ws_ftp_server:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ws_ftp_server:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ws_ftp_server:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ws_ftp_server:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ws_ftp_server:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ws_ftp_server:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ws_ftp_server:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ws_ftp_server:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ws_ftp_server:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ws_ftp_server:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ws_ftp_server:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ws_ftp_server:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ws_ftp_server:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ws_ftp_server:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ws_ftp_server:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ws_ftp_server:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ws_ftp_server:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ws_ftp_server:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ws_ftp_server:3.1:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ws_ftp_server:3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ws_ftp_server:3.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ws_ftp_server:3.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ws_ftp_server:3.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ws_ftp_server:3.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ws_ftp_server:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ws_ftp_server:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 11-10-2023 - 14:45)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bid 9953
bugtraq 20040323 How to crash a harddisk - the Ipswitch WS_FTP Server way
osvdb 4542
sectrack 1009529
secunia 11206
xf
  • wsftp-rest-dos(15560)
  • wsftp-rest-stor-dos(41831)
Last major update 11-10-2023 - 14:45
Published 31-12-2004 - 05:00
Last modified 11-10-2023 - 14:45
Back to Top