First published: Fri Dec 31 2004(Updated: )
Ipswitch WS_FTP Server 4.0.2 allows remote attackers to cause a denial of service (disk consumption) and bypass file size restrictions via a REST command with a large size argument, followed by a STOR of a smaller file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch Ws Ftp Server | =4.01 | |
Ipswitch Ws Ftp Server | =3.0_1 | |
Progress Ipswitch Ws Ftp Server | =1.0.1 | |
Progress Ipswitch Ws Ftp Server | =1.0.2 | |
Progress Ipswitch Ws Ftp Server | =1.0.3 | |
Progress Ipswitch Ws Ftp Server | =1.0.4 | |
Progress Ipswitch Ws Ftp Server | =1.0.5 | |
Progress Ipswitch Ws Ftp Server | =2.0 | |
Progress Ipswitch Ws Ftp Server | =2.0.1 | |
Progress Ipswitch Ws Ftp Server | =2.0.2 | |
Progress Ipswitch Ws Ftp Server | =2.0.3 | |
Progress Ipswitch Ws Ftp Server | =2.0.4 | |
Progress Ipswitch Ws Ftp Server | =3.0 | |
Progress Ipswitch Ws Ftp Server | =3.1 | |
Progress Ipswitch Ws Ftp Server | =3.1.1 | |
Progress Ipswitch Ws Ftp Server | =3.1.2 | |
Progress Ipswitch Ws Ftp Server | =3.1.3 | |
Progress Ipswitch Ws Ftp Server | =3.4 | |
Progress Ipswitch Ws Ftp Server | =4.0 | |
Progress Ipswitch Ws Ftp Server | =4.0.2 | |
Progress Ws Ftp Server | =1.0.1 | |
Progress Ws Ftp Server | =1.0.2 | |
Progress Ws Ftp Server | =1.0.3 | |
Progress Ws Ftp Server | =1.0.4 | |
Progress Ws Ftp Server | =1.0.5 | |
Progress Ws Ftp Server | =2.0 | |
Progress Ws Ftp Server | =2.0.1 | |
Progress Ws Ftp Server | =2.0.2 | |
Progress Ws Ftp Server | =2.0.3 | |
Progress Ws Ftp Server | =2.0.4 | |
Progress Ws Ftp Server | =3.0 | |
Progress Ws Ftp Server | =3.1 | |
Progress Ws Ftp Server | =3.1.1 | |
Progress Ws Ftp Server | =3.1.2 | |
Progress Ws Ftp Server | =3.1.3 | |
Progress Ws Ftp Server | =3.4 | |
Progress Ws Ftp Server | =4.0 | |
Progress Ws Ftp Server | =4.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.