发布时间 :2004-08-29 00:00:00
修订时间 :2017-07-10 21:31:13

[原文]WS_FTP 5.0.2 allows remote authenticated users to cause a denial of service (CPU consumption) via a CD command that contains an invalid path with a "../" sequence.

[CNNVD]Ipswitch WS_FTP服务器CD命令畸形文件路径远程服务拒绝漏洞(CNNVD-200408-226)

        WS_FTP 5.0.2版本存在漏洞。远程认证用户借助包含“../”序列的无效路径的CD命令导致服务拒绝(CPU消耗)。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20040829 [vulnwatch] WS_FTP Server Denial of Service Vulnerability
(UNKNOWN)  XF  wsftp-file-parsing-dos(17155)

- 漏洞信息

Ipswitch WS_FTP服务器CD命令畸形文件路径远程服务拒绝漏洞
中危 其他
2004-08-29 00:00:00 2005-10-20 00:00:00
        WS_FTP 5.0.2版本存在漏洞。远程认证用户借助包含“../”序列的无效路径的CD命令导致服务拒绝(CPU消耗)。

- 公告与补丁

        WS_FTP Server Version 5.04 Hotfix 1 is not vulnerable to this issue.
        Ipswitch WS FTP Server 5.04
        Ipswitch WS FTP Server 5.0.2
        Ipswitch WS FTP Server 5.0.3

- 漏洞信息 (24416)

Ipswitch WS_FTP Server 5.0.x CD Command Malformed File Path Remote Denial of Service Vulnerability (EDBID:24416)
windows remote
2004-08-30 Verified
0 lion
N/A [点击下载]

WS_FTP Server is reported prone to a remote denial of service vulnerability. This issue presents itself when the application processes a malformed file path through the 'cd' command.

WS_FTP Server version 5.0.2 is reported prone to this issue, however, other versions may be affected as well. 

E:\>ftp localhost
Connected to ibm.
220-ibm X2 WS_FTP Server 5.0.2.EVAL (106633167)
220-Fri Aug 27 14:12:19 2004
220-29 days remaining on evaluation.
220 ibm X2 WS_FTP Server 5.0.2.EVAL (106633167)
User (ibm:(none)): ftp
331 Password required
230 user logged in
ftp> cd a../a
Connection closed by remote host. 		

- 漏洞信息

WS_FTP Server Path Parsing Remote DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Public

- 漏洞描述

WS_FTP Server version contains a flaw that may allow a remote denial of service. The issue is triggered in the file path parse module which will cause the FTP server to consume large amounts of CPU power. When this occurs, it will result in loss of availability for the service.

- 时间线

2004-08-31 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround: Restrict access to the FTP server and disallow anonymous usage.

- 相关参考

- 漏洞作者