what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

DST2K0009.txt

DST2K0009.txt
Posted May 31, 2000
Authored by Delphis Security Team | Site delphisplc.com

Delphis Consulting Plc Security Team Advisory DST2K0009 - Userlisting Bug in Ipswitch WS_FTP Server 1.05E allows remote users to confuse the server manager.

tags | exploit, remote
SHA-256 | c45c47e0f2f64311cef176002da746700559bf5930be62695ff30bd1c8a2b23b

DST2K0009.txt

Change Mirror Download
================================================================================
Delphis Consulting Plc
================================================================================

Security Team Advisories
[31/05/2000]


securityteam@delphisplc.com
[https://www.delphisplc.com/thinking/whitepapers/]

================================================================================
Adv : DST2K0009
Title : Userlisting Bug in Ipswitch WS_FTP Server 1.05E
Author : DCIST (securityteam@delphisplc.com)
O/S : Microsoft Windows NT v4.0 Server (SP5)
Product : Ipswitch WS_FTP Server 1.05E
Date : 31/05/2000

I. Description

II. Solution

III. Disclaimer


================================================================================


I. Description
================================================================================

Severity: Low

An attacker using the "USER" command with a very long name, approximately 1000
characters, can confuse the Server Manager in certain circumstances.

If the site administrator connects remotely using the Server Manager, and then
views the Session Manager before expanding the tree, Server Manager cannot
properly administer the site during that connection. Invalid objects, or no
objects will appear in the tree, and the Session Manager may not display
all users currently logged in.

If the site administrator opens the tree before viewing the Session Manager, only
the Session Manager data will be incorrect. Typically this manifests itself as an
inability to show all users currently connected to the site being administered.

Attempting to refresh the Session Manager whilst it is in this confused state
leads to the Session Manager not displaying any users on the site being administered.

Note that all detail still appears correctly logged in WS_FTP's log files.



II. Solution
================================================================================

Vendor Status: Informed

Currently there is no vendor patch available but the following is a working around
Delphis Consulting Internet Security Team would for users running this service.

The workaround is to kill the invalid username the FIRST time Session Manager is invoked.
Disconnecting and reconnecting to the remote site should then allow normal administration. It
is possible that this procedure would need to be followed several times for each invalid username.


III. Disclaimer
================================================================================
THE INFORMATION CONTAINED IN THIS ADVISORY IS BELIEVED TO BE ACCURATE AT
THE TIME OF PRINTING, BUT NO REPRESENTATION OR WARRANTY IS GIVEN, EXPRESS OR
IMPLIED, AS TO ITS ACCURACY OR COMPLETENESS. NEITHER THE AUTHOR NOR THE
PUBLISHER ACCEPTS ANY LIABILITY WHATSOEVER FOR ANY DIRECT, INDIRECT OR
CONSEQUENTIAL LOSS OR DAMAGE ARISING IN ANY WAY FROM ANY USE OF, OR RELIANCE
PLACED ON, THIS INFORMATION FOR ANY PURPOSE.
================================================================================

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    26 Files
  • 27
    Sep 27th
    39 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    24 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close