ID

VAR-200808-0037


CVE

CVE-2008-3795


TITLE

Ipswitch WS_FTP Home Client buffer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2008-004792

DESCRIPTION

Buffer overflow in Ipswitch WS_FTP Home client allows remote FTP servers to have an unknown impact via a long "message response.". Ipswitch WS_FTP is prone to a remote buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker may exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. Ipswitch WS_FTP is an FTP client software. ---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: WS_FTP Home / Professional Format String Vulnerability SECUNIA ADVISORY ID: SA31504 VERIFY ADVISORY: http://secunia.com/advisories/31504/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote SOFTWARE: Ipswitch WS_FTP Professional 2007 http://secunia.com/product/13838/ Ipswitch WS_FTP Home 2007 http://secunia.com/product/19609/ DESCRIPTION: securfrog has discovered a vulnerability in WS_FTP Home and Professional, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to a format string error when processing responses of the FTP server. This can be exploited by e.g. tricking a user into connecting to a malicious FTP server. Successful exploitation may allow the execution of arbitrary code. The vulnerability is confirmed in WS_FTP Home version 2007.0.0.2 and WS_FTP Professional version 2007.1.0.0. Other versions may also be affected. SOLUTION: Connect to trusted servers only. PROVIDED AND/OR DISCOVERED BY: securfrog ORIGINAL ADVISORY: http://milw0rm.com/exploits/6257 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-3795 // JVNDB: JVNDB-2008-004792 // BID: 30728 // VULHUB: VHN-33920 // PACKETSTORM: 69208

AFFECTED PRODUCTS

vendor:ipswitchmodel:ws ftp homescope: - version: -

Trust: 1.4

vendor:ipswitchmodel:ws ftp homescope:eqversion:*

Trust: 1.0

vendor:ipswitchmodel:ws ftp proscope:eqversion:8.03

Trust: 0.3

vendor:ipswitchmodel:ws ftp proscope:eqversion:8.02

Trust: 0.3

vendor:ipswitchmodel:ws ftp proscope:eqversion:7.5

Trust: 0.3

vendor:ipswitchmodel:ws ftp proscope:eqversion:6.0

Trust: 0.3

vendor:ipswitchmodel:ws ftp proscope:eqversion:5

Trust: 0.3

vendor:ipswitchmodel:ws ftp proscope:eqversion:0

Trust: 0.3

vendor:ipswitchmodel:ws ftp homescope:eqversion:0

Trust: 0.3

sources: BID: 30728 // JVNDB: JVNDB-2008-004792 // CNNVD: CNNVD-200808-335 // NVD: CVE-2008-3795

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-3795
value: HIGH

Trust: 1.0

NVD: CVE-2008-3795
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200808-335
value: CRITICAL

Trust: 0.6

VULHUB: VHN-33920
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-3795
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-33920
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-33920 // JVNDB: JVNDB-2008-004792 // CNNVD: CNNVD-200808-335 // NVD: CVE-2008-3795

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-33920 // JVNDB: JVNDB-2008-004792 // NVD: CVE-2008-3795

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200808-335

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200808-335

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-004792

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-33920

PATCH

title:Top pageurl:http://www.ipswitch.com/

Trust: 0.8

sources: JVNDB: JVNDB-2008-004792

EXTERNAL IDS

db:NVDid:CVE-2008-3795

Trust: 2.8

db:BIDid:30728

Trust: 2.0

db:EXPLOIT-DBid:6257

Trust: 1.8

db:SREASONid:4173

Trust: 1.7

db:JVNDBid:JVNDB-2008-004792

Trust: 0.8

db:MILW0RMid:6257

Trust: 0.6

db:XFid:44744

Trust: 0.6

db:CNNVDid:CNNVD-200808-335

Trust: 0.6

db:SECUNIAid:31504

Trust: 0.2

db:VULHUBid:VHN-33920

Trust: 0.1

db:PACKETSTORMid:69208

Trust: 0.1

sources: VULHUB: VHN-33920 // BID: 30728 // JVNDB: JVNDB-2008-004792 // PACKETSTORM: 69208 // CNNVD: CNNVD-200808-335 // NVD: CVE-2008-3795

REFERENCES

url:http://www.securityfocus.com/bid/30728

Trust: 1.7

url:http://securityreason.com/securityalert/4173

Trust: 1.7

url:https://www.exploit-db.com/exploits/6257

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/44744

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3795

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-3795

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/44744

Trust: 0.6

url:http://www.milw0rm.com/exploits/6257

Trust: 0.6

url:http://www.ipswitch.com/products/ws_ftp/home/index.asp

Trust: 0.3

url:http://secunia.com/advisories/31504/

Trust: 0.1

url:http://milw0rm.com/exploits/6257

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/19609/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://corporate.secunia.com/about_secunia/64/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/13838/

Trust: 0.1

sources: VULHUB: VHN-33920 // BID: 30728 // JVNDB: JVNDB-2008-004792 // PACKETSTORM: 69208 // CNNVD: CNNVD-200808-335 // NVD: CVE-2008-3795

CREDITS

securfrog

Trust: 0.9

sources: BID: 30728 // CNNVD: CNNVD-200808-335

SOURCES

db:VULHUBid:VHN-33920
db:BIDid:30728
db:JVNDBid:JVNDB-2008-004792
db:PACKETSTORMid:69208
db:CNNVDid:CNNVD-200808-335
db:NVDid:CVE-2008-3795

LAST UPDATE DATE

2025-04-10T23:17:58.852000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-33920date:2017-09-29T00:00:00
db:BIDid:30728date:2015-05-07T17:24:00
db:JVNDBid:JVNDB-2008-004792date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200808-335date:2009-03-18T00:00:00
db:NVDid:CVE-2008-3795date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-33920date:2008-08-27T00:00:00
db:BIDid:30728date:2008-08-18T00:00:00
db:JVNDBid:JVNDB-2008-004792date:2012-09-25T00:00:00
db:PACKETSTORMid:69208date:2008-08-19T18:45:56
db:CNNVDid:CNNVD-200808-335date:2008-08-27T00:00:00
db:NVDid:CVE-2008-3795date:2008-08-27T15:21:00