Vulnerabilities > CVE-2001-1021 - Unspecified vulnerability in Progress WS FTP Server 2.0.2
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflows in WS_FTP 2.02 allow remote attackers to execute arbitrary code via long arguments to (1) DELE, (2) MDTM, (3) MLST, (4) MKD, (5) RMD, (6) RNFR, (7) RNTO, (8) SIZE, (9) STAT, (10) XMKD, or (11) XRMD.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description WS-FTP 2.0 Anonymous Multiple FTP Command Buffer Overflow Vulnerability. CVE-2001-1021. Remote exploit for windows platform id EDB-ID:21036 last seen 2016-02-02 modified 2001-07-25 published 2001-07-25 reporter andreas source https://www.exploit-db.com/download/21036/ title WS-FTP 2.0 Anonymous Multiple FTP Command Buffer Overflow Vulnerability description WS_FTP Server <= 5.03 (RNFR) Buffer Overflow Exploit. CVE-2001-1021. Dos exploit for windows platform id EDB-ID:1158 last seen 2016-01-31 modified 2004-11-29 published 2004-11-29 reporter Reed Arvin source https://www.exploit-db.com/download/1158/ title WS_FTP Server <= 5.03 RNFR Buffer Overflow Exploit
Nessus
NASL family | FTP |
NASL id | WSFTP_OVERFLOWS.NASL |
description | It is possible to shut down the remote FTP server by issuing a command followed by a too long argument. An attacker may use this flow to prevent your site from sharing some resources with the rest of the world, or even execute arbitrary code on your system. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11094 |
published | 2002-08-21 |
reporter | This script is Copyright (C) 2002-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/11094 |
title | WS_FTP Multiple Command Long Argument Overflow |