Vulnerabilities > CVE-1999-1078 - Unspecified vulnerability in Ipswitch WS FTP PRO 6.0

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
ipswitch
nessus

Summary

WS_FTP Pro 6.0 uses weak encryption for passwords in its initialization files, which allows remote attackers to easily decrypt the passwords and gain privileges.

Vulnerable Configurations

Part Description Count
Application
Ipswitch
1

Nessus

NASL familyWindows
NASL idWS_FTP_CLIENT_WEAK_STORED_PASS.NASL
descriptionThe version of WS_FTP client installed on the remote host uses a weak encryption method to store password information. A local attacker could exploit this to discover FTP passwords.
last seen2020-06-01
modified2020-06-02
plugin id14597
published2004-09-01
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/14597
titleWS_FTP Pro Client Weak Password Encrypted
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(14597);
 script_version("1.15");

 script_cve_id("CVE-1999-1078");
 script_bugtraq_id(547);

 script_name(english:"WS_FTP Pro Client Weak Password Encrypted");
  script_set_attribute(
    attribute:"synopsis",
    value:"The remote FTP client is using weak encryption."
  );
  script_set_attribute(
    attribute:"description",
    value:
"The version of WS_FTP client installed on the remote host uses a weak
encryption method to store password information.  A local attacker
could exploit this to discover FTP passwords."
  );
  script_set_attribute(
    attribute:"solution",
    value:"Upgrade to the latest version of WS_FTP client."
  );
 script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2004/09/01");
 script_set_attribute(attribute:"vuln_publication_date", value: "1999/07/29");
 script_cvs_date("Date: 2018/08/07 16:46:51");
  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe",value:"cpe:/a:ipswitch:ws_ftp");
  script_end_attributes();

 script_summary(english:"Check IPSWITCH WS_FTP version");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows");
 script_dependencies("ws_ftp_client_overflows.nasl");
 script_require_keys("ws_ftp_client/version");
 exit(0);
}

# start script

version = get_kb_item("ws_ftp_client/version");
if ( ! version ) exit(0);

if (ereg(string:version, pattern:"^([0-5]\.[0-9]\.[0-9]|6\.0\.0\.0[^0-9])")) 
  security_note(get_kb_item("SMB/transport"));