First published: Wed Apr 21 2010(Updated: )
Format string vulnerability in Ipswitch WS_FTP Professional 12 before 12.2 allows remote attackers to cause a denial of service (crash) via format string specifiers in the status code portion of an HTTP response.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch WS FTP | =12.0 | |
Ipswitch WS FTP | =12.0 | |
Ipswitch WS FTP | =12.0.1 | |
Ipswitch WS FTP | =12.0.1 | |
Ipswitch WS FTP Server | =12.0 | |
Ipswitch WS FTP Server | =12.0 | |
Ipswitch WS FTP Server | =12.0.1 | |
Ipswitch WS FTP Server | =12.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4775 is classified as a medium severity vulnerability due to its potential to cause denial of service.
To fix CVE-2009-4775, upgrade to Ipswitch WS_FTP Professional version 12.2 or later.
CVE-2009-4775 affects Ipswitch WS_FTP versions 12.0 and 12.0.1, both for Professional and Home editions.
CVE-2009-4775 is a format string vulnerability that can lead to a denial of service.
Yes, CVE-2009-4775 can be exploited remotely through crafted HTTP response status codes.