Vulnerability Description
Multiple buffer overflows in Ipswitch WS_FTP Server 4.0.2 (1) allow remote authenticated users to execute arbitrary code by causing a large error string to be generated by the ALLO handler, or (2) may allow remote FTP administrators to execute arbitrary code by causing a long hostname or username to be inserted into a reply to a STAT command while a file is being transferred.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Progress | Ws Ftp Server | 4.0.2 |
References
- http://marc.info/?l=bugtraq&m=108006553222397&w=2
- http://secunia.com/advisories/11206Patch
- http://www.securityfocus.com/archive/1/358361
- http://www.securityfocus.com/bid/9953
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15561
- http://marc.info/?l=bugtraq&m=108006553222397&w=2
- http://secunia.com/advisories/11206Patch
- http://www.securityfocus.com/archive/1/358361
- http://www.securityfocus.com/bid/9953
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15561
FAQ
What is CVE-2004-1883?
CVE-2004-1883 is a vulnerability with a CVSS score of 7.2 (HIGH). Multiple buffer overflows in Ipswitch WS_FTP Server 4.0.2 (1) allow remote authenticated users to execute arbitrary code by causing a large error string to be generated by the ALLO handler, or (2) may...
How severe is CVE-2004-1883?
CVE-2004-1883 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-1883?
Check the references section above for vendor advisories and patch information. Affected products include: Progress Ws Ftp Server.