WS_FTP Server CWD/MKD DoS

2003-12-17T08:47:25
ID OSVDB:3060
Type osvdb
Reporter Dr_insane(dr_insane@pathfinder.gr)
Modified 2003-12-17T08:47:25

Description

Vulnerability Description

WS_FTP Server contains a flaw that may allow a remote denial of service. The issue is triggered when the server receives a packet supplying multiple dots (".") as argument to the "CWD" command followed by an attempt to create an arbitrary directory with the "MKD" command. Vulnerable hosts can be degraded by consuming about 98% CPU resources.

Solution Description

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): Grant only trusted users access and filter malicious characters and character sequences in a FTP proxy.

Short Description

WS_FTP Server contains a flaw that may allow a remote denial of service. The issue is triggered when the server receives a packet supplying multiple dots (".") as argument to the "CWD" command followed by an attempt to create an arbitrary directory with the "MKD" command. Vulnerable hosts can be degraded by consuming about 98% CPU resources.

References:

Vendor URL: http://www.ipswitch.com/ Secunia Advisory ID:10452 Other Advisory URL: http://members.lycos.co.uk/r34ct/bin/fclick/fclick.php?fid=10