Ipswitch WS_FTP Server 4.0.2 allows remote attackers to cause a denial of service (disk consumption) and bypass file size restrictions via a REST command with a large size argument, followed by a STOR of a smaller file.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=108006717731989&w=2 - | |
References | () http://secunia.com/advisories/11206 - Exploit, Patch | |
References | () http://securitytracker.com/id?1009529 - Exploit | |
References | () http://www.osvdb.org/4542 - | |
References | () http://www.securityfocus.com/bid/9953 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/15560 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/41831 - |
Information
Published : 2004-12-31 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2004-1848
Mitre link : CVE-2004-1848
CVE.ORG link : CVE-2004-1848
JSON object : View
Products Affected
progress
- ws_ftp_server
ipswitch
- ws_ftp_server
CWE
CWE-399
Resource Management Errors