ID CVE-2006-4847
Summary Multiple buffer overflows in Ipswitch WS_FTP Server 5.05 before Hotfix 1 allow remote authenticated users to execute arbitrary code via long (1) XCRC, (2) XSHA1, or (3) XMD5 commands. This vulnerability is addressed in the following product update: Ipswitch, WS_FTP Server, 5.05 Hotfix 1
References
Vulnerable Configurations
  • cpe:2.3:a:ipswitch:ws_ftp_server:1.0.1eval:*:*:*:*:*:*:*
    cpe:2.3:a:ipswitch:ws_ftp_server:1.0.1eval:*:*:*:*:*:*:*
  • cpe:2.3:a:ipswitch:ws_ftp_server:1.0.2eval:*:*:*:*:*:*:*
    cpe:2.3:a:ipswitch:ws_ftp_server:1.0.2eval:*:*:*:*:*:*:*
  • cpe:2.3:a:ipswitch:ws_ftp_server:3.0_1:*:*:*:*:*:*:*
    cpe:2.3:a:ipswitch:ws_ftp_server:3.0_1:*:*:*:*:*:*:*
  • cpe:2.3:a:ipswitch:ws_ftp_server:4.01:*:*:*:*:*:*:*
    cpe:2.3:a:ipswitch:ws_ftp_server:4.01:*:*:*:*:*:*:*
  • cpe:2.3:a:ipswitch:ws_ftp_server:5.02:*:*:*:*:*:*:*
    cpe:2.3:a:ipswitch:ws_ftp_server:5.02:*:*:*:*:*:*:*
  • cpe:2.3:a:ipswitch:ws_ftp_server:5.03:*:*:*:*:*:*:*
    cpe:2.3:a:ipswitch:ws_ftp_server:5.03:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.4:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:5.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:5.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:5.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:5.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:5.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:5.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:5.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:5.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:progress:ipswitch_ws_ftp_server:5.0.8:-:limited:*:*:*:*:*
    cpe:2.3:a:progress:ipswitch_ws_ftp_server:5.0.8:-:limited:*:*:*:*:*
CVSS
Base: 6.5 (as of 13-08-2019 - 14:40)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:S/C:P/I:P/A:P
refmap via4
bid 20076
confirm http://ipswitch.com/support/ws_ftp-server/releases/wr505hf1.asp
osvdb 28939
secunia 21932
vupen ADV-2006-3655
xf wsftp-xcrc-xsha1-xmd5-bo(28983)
saint via4
bid 20076
description WS_FTP XCRC buffer overflow
id ftp_wsftp
osvdb 28939
title ws_ftp_xcrc
type remote
Last major update 13-08-2019 - 14:40
Published 19-09-2006 - 01:07
Last modified 13-08-2019 - 14:40
Back to Top