Vulnerability Description
Buffer overflow in Ipswitch WS_FTP Server with SSH 6.1.0.0 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long opendir command.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Progress | Ws Ftp Server | 6.1.0.0 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/28753Vendor Advisory
- http://securityreason.com/securityalert/3609
- http://www.securityfocus.com/archive/1/487441/100/0/threaded
- http://www.securityfocus.com/bid/27573
- http://www.vupen.com/english/advisories/2008/0400/references
- https://www.exploit-db.com/exploits/5044
- http://secunia.com/advisories/28753Vendor Advisory
- http://securityreason.com/securityalert/3609
- http://www.securityfocus.com/archive/1/487441/100/0/threaded
- http://www.securityfocus.com/bid/27573
- http://www.vupen.com/english/advisories/2008/0400/references
- https://www.exploit-db.com/exploits/5044
FAQ
What is CVE-2008-0590?
CVE-2008-0590 is a vulnerability with a CVSS score of 9.0 (HIGH). Buffer overflow in Ipswitch WS_FTP Server with SSH 6.1.0.0 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long opendir command.
How severe is CVE-2008-0590?
CVE-2008-0590 has been rated HIGH with a CVSS base score of 9.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-0590?
Check the references section above for vendor advisories and patch information. Affected products include: Progress Ws Ftp Server.