Vulnerabilities > CVE-2004-1643 - Unspecified vulnerability in Progress WS FTP Server 5.0.2
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
WS_FTP 5.0.2 allows remote authenticated users to cause a denial of service (CPU consumption) via a CD command that contains an invalid path with a "../" sequence.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Ipswitch WS_FTP Server 5.0.x CD Command Malformed File Path Remote Denial of Service Vulnerability. CVE-2004-1643. Dos exploit for windows platform |
id | EDB-ID:24416 |
last seen | 2016-02-02 |
modified | 2004-08-30 |
published | 2004-08-30 |
reporter | lion |
source | https://www.exploit-db.com/download/24416/ |
title | Ipswitch WS_FTP Server 5.0.x - CD Command Malformed File Path Remote Denial of Service Vulnerability |
Nessus
NASL family | FTP |
NASL id | WSFTP_FILE_PATH_PARSING_DOS.NASL |
description | According to its banner, the version of WS_FTP on the remote host is vulnerable to a remote denial of service. There is an error in the parsing of file paths. Exploitation of this flaw may cause a vulnerable system to use a large amount of CPU resources. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14584 |
published | 2004-08-31 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/14584 |
title | WS_FTP Server Path Parsing Remote DoS |
code |
|