Check Point Advisories

Ipswitch WS_FTP Server FTP Commands Buffer Overflow (CVE-2006-4847)

Check Point Reference: CPAI-2006-297
Date Published: 11 Oct 2009
Severity: High
Last Updated: Sunday 11 October, 2009
Source:
Industry Reference:CVE-2006-4847
Protection Provided by:

Security Gateway
R81, R80, R77, R75

Who is Vulnerable?
Vulnerability Description The Ipswitch WS_FTP server is a full featured secure File Transfer Protocol (FTP) server complete with several optional authentication mechanisms, encryption and data access controls. It is fully compliant with the File Transfer Protocol specifications. There exists a buffer overflow vulnerability in the Ipswitch WS_FTP server. The vulnerability is due to insufficient validation checks in the processing of the FTP XCRC, XSHA1 or XMD5 commands. An authenticated remote attacker may exploit this vulnerability to cause a denial of service condition or execute arbitrary code in the context of the vulnerable service, normally System. An attack exploiting this vulnerability may result in either a denial of service condition of the affected service or diversion of the process flow of the affected process. In the case of a successful code execution attack, the affected process will be diverted to attacker supplied code which is injected during the attack. It is most probable that the affected server will stop to function as intended after having been compromised. If a code execution attack is not successful, then the current connection thread will be terminated. The service, however, resumes to operate normally. In specific cases, the attack might result in the termination of the process and a consequent denial of service condition.

Protection Overview

This protection will detect and block attempts to exploit this vulnerability

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75

  1. In the IPS tab, click Protections and find the Ipswitch WS_FTP Server FTP Commands Buffer Overflow protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  FTP Enforcement Violation.
Attack Information:  Ipswitch WS_FTP server FTP commands buffer overflow

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK