First published: Fri Feb 02 2007(Updated: )
Ipswitch WS_FTP Server 5.04 allows FTP site administrators to execute arbitrary code on the system via a long input string to the (1) iFTPAddU or (2) iFTPAddH file, or to a (3) edition module.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Progress WS FTP Server | =5.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0666 is classified as critical due to its potential to allow arbitrary code execution.
To fix CVE-2007-0666, it is recommended to upgrade to a patched version of Ipswitch WS_FTP Server.
CVE-2007-0666 specifically affects Ipswitch WS_FTP Server version 5.04.
CVE-2007-0666 can be exploited through crafted long input strings provided to specific FTP site administration modules.
There are no specific workarounds for CVE-2007-0666, making upgrade the primary mitigation strategy.