First published: Mon Sep 25 2006(Updated: )
Buffer overflow in Ipswitch WS_FTP Limited Edition (LE) 5.08 allows remote FTP servers to execute arbitrary code via a long response to a PASV command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Progress WS FTP Server | =5.08_limited_edition |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4974 is considered critical due to the potential for remote code execution.
The best way to fix CVE-2006-4974 is to upgrade Ipswitch WS_FTP Limited Edition to a newer, patched version.
CVE-2006-4974 specifically affects Ipswitch WS_FTP Limited Edition version 5.08.
CVE-2006-4974 can be exploited by sending a long response to a PASV command to trigger the buffer overflow.
A potential workaround for CVE-2006-4974 is to restrict access to the FTP server from untrusted networks.