First published: Tue Sep 26 2006(Updated: )
Multiple buffer overflows in WS_FTP Server 5.05 before Hotfix 1, and possibly other versions down to 5.0, have unknown impact and remote authenticated attack vectors via the (1) XCRC, (2) XMD5, and (3) XSHA1 commands. NOTE: in the early publication of this identifier on 20060926, the description was used for the wrong issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Progress WS FTP Server | =5.02 | |
Progress WS FTP Server | =5.03 | |
Progress WS FTP Server | =5.05 | |
Ipswitch WS FTP Server | =5.0.2 | |
Ipswitch WS FTP Server | =5.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5000 has an unknown impact but involves multiple buffer overflows, which typically indicate a serious security vulnerability.
To fix CVE-2006-5000, apply Hotfix 1 for WS_FTP Server 5.05 or upgrade to a later version that addresses the vulnerability.
CVE-2006-5000 affects WS_FTP Server versions 5.0.2, 5.03, and 5.05, prior to Hotfix 1.
The vendor for CVE-2006-5000 is Ipswitch, Inc., which developed the WS_FTP Server.
CVE-2006-5000 can be exploited via remote authenticated attack vectors using the XCRC, XMD5, and XSHA1 commands.