Check Point Reference: | CPAI-2011-128 |
Date Published: | 5 Jan 2012 |
Severity: | High |
Last Updated: | Monday 25 November, 2024 |
Source: | |
Protection Provided by: |
IPS-1 |
Who is Vulnerable? | Freefloat FTP Servers |
Vulnerability Description | A buffer overflow vulnerability has been reported in Freefloat FTP Server. |
Vulnerability Details | The vulnerability is due to insufficient validation while handling overly long FTP requests sent to the server. A remote attacker may exploit this vulnerability by sending a specially crafted command to an affected FreeFloat FTP server. Successful exploitation could allow an attacker to execute arbitrary code on the target server. |
The protection will block FTP server replies which contain overly long strings.
1. In the IPS-1 Policy Manager, click on the Protection tab.
2. In the Protection tree, click Application Intelligence > FTP, and select the FTP Compliance protection group.
3. Click Microsoft Internet Explorer FTP Response Parsing Memory Corruption.
4. In the configuration pane, under Settings, check Active.
5. Click on Install Policy.
Upon attack, the following entries will be logged:
Alert Name: FTP Compliance
Description: Microsoft Internet Explorer FTP Response Parsing Memory Corruption