ID

VAR-200707-0241


CVE

CVE-2007-3823


TITLE

IPSwitch WS_FTP of Logsrv.exe Denial of service in Japan (DoS) Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2007-004129

DESCRIPTION

The Logging Server (Logsrv.exe) in IPSwitch WS_FTP 7.5.29.0 allows remote attackers to cause a denial of service (daemon crash) by sending a crafted packet containing a long string to port 5151/udp. WS_FTP is prone to a denial-of-service vulnerability. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: Ipswitch WS_FTP Server FTP Log Server Denial of Service Vulnerability SECUNIA ADVISORY ID: SA26040 VERIFY ADVISORY: http://secunia.com/advisories/26040/ CRITICAL: Moderately critical IMPACT: DoS WHERE: >From remote SOFTWARE: WS_FTP Server 6.x http://secunia.com/product/14782/ DESCRIPTION: Justin Seitz has discovered a vulnerability in Ipswitch WS_FTP Server, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the FTP Log Server (ftplogsrv.exe) when handling certain messages. The vulnerability is confirmed in FTP Log Server (ftplogsrv.exe) version 7.5.29.0 included in WS_FTP Server 6. Other versions may also be affected. SOLUTION: Restrict network access to the affected service. PROVIDED AND/OR DISCOVERED BY: Justin Seitz, VDA Labs ORIGINAL ADVISORY: http://www.vdalabs.com/tools/ipswitch.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-3823 // JVNDB: JVNDB-2007-004129 // BID: 85529 // VULHUB: VHN-27185 // PACKETSTORM: 57723

AFFECTED PRODUCTS

vendor:ipswitchmodel:ws ftpscope:eqversion:7.5.29.0

Trust: 2.7

sources: BID: 85529 // JVNDB: JVNDB-2007-004129 // CNNVD: CNNVD-200707-284 // NVD: CVE-2007-3823

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-3823
value: HIGH

Trust: 1.0

NVD: CVE-2007-3823
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200707-284
value: HIGH

Trust: 0.6

VULHUB: VHN-27185
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-3823
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-27185
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-27185 // JVNDB: JVNDB-2007-004129 // CNNVD: CNNVD-200707-284 // NVD: CVE-2007-3823

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-3823

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200707-284

TYPE

unknown

Trust: 0.6

sources: CNNVD: CNNVD-200707-284

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-004129

PATCH

title:Fixed in 6.1url:http://docs.ipswitch.com/WS_FTP_Server611/ReleaseNotes/index.htm?k_id=ipswitch_ftp_documents_worldwide_ws_ftpserverv61releasenotes#link13

Trust: 0.8

sources: JVNDB: JVNDB-2007-004129

EXTERNAL IDS

db:NVDid:CVE-2007-3823

Trust: 2.8

db:SECUNIAid:26040

Trust: 1.8

db:OSVDBid:36218

Trust: 1.7

db:XFid:35396

Trust: 0.9

db:JVNDBid:JVNDB-2007-004129

Trust: 0.8

db:CNNVDid:CNNVD-200707-284

Trust: 0.7

db:BIDid:85529

Trust: 0.4

db:VULHUBid:VHN-27185

Trust: 0.1

db:PACKETSTORMid:57723

Trust: 0.1

sources: VULHUB: VHN-27185 // BID: 85529 // JVNDB: JVNDB-2007-004129 // PACKETSTORM: 57723 // CNNVD: CNNVD-200707-284 // NVD: CVE-2007-3823

REFERENCES

url:http://www.vdalabs.com/tools/ipswitch.html

Trust: 2.1

url:http://packetstormsecurity.org/0707-advisories/wsftp75290-dos.txt

Trust: 2.0

url:http://www.osvdb.org/36218

Trust: 1.7

url:http://secunia.com/advisories/26040

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/35396

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/35396

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3823

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-3823

Trust: 0.8

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/26040/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/product/14782/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-27185 // BID: 85529 // JVNDB: JVNDB-2007-004129 // PACKETSTORM: 57723 // CNNVD: CNNVD-200707-284 // NVD: CVE-2007-3823

CREDITS

Unknown

Trust: 0.3

sources: BID: 85529

SOURCES

db:VULHUBid:VHN-27185
db:BIDid:85529
db:JVNDBid:JVNDB-2007-004129
db:PACKETSTORMid:57723
db:CNNVDid:CNNVD-200707-284
db:NVDid:CVE-2007-3823

LAST UPDATE DATE

2025-04-10T23:03:37.507000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-27185date:2017-07-29T00:00:00
db:BIDid:85529date:2007-07-16T00:00:00
db:JVNDBid:JVNDB-2007-004129date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200707-284date:2007-07-19T00:00:00
db:NVDid:CVE-2007-3823date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-27185date:2007-07-17T00:00:00
db:BIDid:85529date:2007-07-16T00:00:00
db:JVNDBid:JVNDB-2007-004129date:2012-09-25T00:00:00
db:PACKETSTORMid:57723date:2007-07-13T21:43:57
db:CNNVDid:CNNVD-200707-284date:2007-07-16T00:00:00
db:NVDid:CVE-2007-3823date:2007-07-17T01:30:00