Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
| GEN:SID | 1:3077 |
| Message | FTP RNFR overflow attempt |
| Summary | This event is generated when an attempt is made to exploit a buffer overflow associated with the RNFR command of the IPSwitch WS_FTP server. |
| Impact | A successful attack may cause a denial of service or a buffer overflow and the subsequent execution of arbitrary code on a vulnerable server. |
| Detailed Information | A vulnerability exists in the way that the IPSwitch WS_FTP service handles the RNFR command. An excessively long parameter supplied to the command can trigger a denial of service or a buffer overflow and the subsequent execution of arbitrary code on a vulnerable server. |
| Affected Systems | IPSwitch WS_FTP 4.x, 5.x |
| Attack Scenarios | An attacker can supplied an overly long parameter with the RNFR command, possibly causing denial of service or a buffer overflow. |
| Ease of Attack | Simple. |
| Corrective Action | Upgrade to the latest non-affected version of the software. |
| Additional References | Secunia: http://secunia.com/advisories/13334 |
| Rule References | bugtraq: 14339 |
--
DID:537438
--
http://www.aanval.com/