7.5
CVSSv2

CVE-2001-1021

Published: 26/07/2001 Updated: 11/10/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflows in WS_FTP 2.02 allow remote malicious users to execute arbitrary code via long arguments to (1) DELE, (2) MDTM, (3) MLST, (4) MKD, (5) RMD, (6) RNFR, (7) RNTO, (8) SIZE, (9) STAT, (10) XMKD, or (11) XRMD.

Vulnerable Product Search on Vulmon Subscribe to Product

progress ws ftp server 2.0.2

Exploits

#===== Start WS_FTP_Overflowpl ===== # # Usage: WS_FTP_Overflowpl <ip> <ftp user> <ftp pass> # WS_FTP_Overflowpl 127001 hello moto # # WS_FTP Server Version 503, 20041014 # # Download: # wwwipswitchcom/ # ###################################################### use IO::Socket; use strict; my($socket) = ""; ...
source: wwwsecurityfocuscom/bid/3102/info WS-FTP Server is vulnerable to malicious remote user input argumenting multiple FTP commands received from anonymously connecting clients An attacker may supply a long sequence of characters as an argument to any of the affected commands If the length of the argumenting string exceeds the size ...