ID

VAR-200412-1229


CVE

CVE-2004-1848


TITLE

Progress Software Ipswitch WS_FTP Server Security hole

Trust: 0.6

sources: CNNVD: CNNVD-200412-199

DESCRIPTION

Ipswitch WS_FTP Server 4.0.2 allows remote attackers to cause a denial of service (disk consumption) and bypass file size restrictions via a REST command with a large size argument, followed by a STOR of a smaller file. Multiple vulnerabilities have been identified in the WS_FTP Server and client applications. The issues include two remote buffer overflow vulnerabilities in the client, a denial of service vulnerability in the server and an access validation issue in the server leading to remote command execution with SYSTEM privileges. These issues are undergoing further analysis. This BID will be divided into separate issues as analysis is completed. Progress Software Ipswitch WS_FTP Server is a set of FTP server software developed by Progress Software Company in the United States. It provides functions such as file transfer control and transfer encryption. A resource management error vulnerability exists in Progress Software Ipswitch WS_FTP Server version 4.0.2. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products

Trust: 1.26

sources: NVD: CVE-2004-1848 // BID: 9953 // VULHUB: VHN-10277

AFFECTED PRODUCTS

vendor:ipswitchmodel:ws ftp serverscope:eqversion:4.01

Trust: 1.3

vendor:progressmodel:ws ftp serverscope:eqversion:3.1.3

Trust: 1.0

vendor:progressmodel:ws ftp serverscope:eqversion:4.0

Trust: 1.0

vendor:progressmodel:ws ftp serverscope:eqversion:3.1

Trust: 1.0

vendor:progressmodel:ws ftp serverscope:eqversion:2.0.1

Trust: 1.0

vendor:progressmodel:ws ftp serverscope:eqversion:3.1.1

Trust: 1.0

vendor:progressmodel:ws ftp serverscope:eqversion:3.1.2

Trust: 1.0

vendor:progressmodel:ws ftp serverscope:eqversion:2.0.3

Trust: 1.0

vendor:progressmodel:ws ftp serverscope:eqversion:3.4

Trust: 1.0

vendor:progressmodel:ws ftp serverscope:eqversion:1.0.3

Trust: 1.0

vendor:progressmodel:ws ftp serverscope:eqversion:1.0.2

Trust: 1.0

vendor:ipswitchmodel:ws ftp serverscope:eqversion:3.0_1

Trust: 1.0

vendor:progressmodel:ws ftp serverscope:eqversion:4.0.2

Trust: 1.0

vendor:progressmodel:ws ftp serverscope:eqversion:1.0.1

Trust: 1.0

vendor:progressmodel:ws ftp serverscope:eqversion:2.0.2

Trust: 1.0

vendor:progressmodel:ws ftp serverscope:eqversion:1.0.4

Trust: 1.0

vendor:progressmodel:ws ftp serverscope:eqversion:3.0

Trust: 1.0

vendor:progressmodel:ws ftp serverscope:eqversion:2.0

Trust: 1.0

vendor:progressmodel:ws ftp serverscope:eqversion:2.0.4

Trust: 1.0

vendor:progressmodel:ws ftp serverscope:eqversion:1.0.5

Trust: 1.0

vendor:ipswitchmodel:ws ftp serverscope:eqversion:2.0.4

Trust: 0.9

vendor:ipswitchmodel:ws ftp serverscope:eqversion:2.0.3

Trust: 0.9

vendor:ipswitchmodel:ws ftp serverscope:eqversion:2.0.2

Trust: 0.9

vendor:ipswitchmodel:ws ftp serverscope:eqversion:2.0.1

Trust: 0.9

vendor:ipswitchmodel:ws ftp serverscope:eqversion:2.0

Trust: 0.9

vendor:ipswitchmodel:ws ftp serverscope:eqversion:1.0.5

Trust: 0.9

vendor:ipswitchmodel:ws ftp serverscope:eqversion:1.0.4

Trust: 0.9

vendor:ipswitchmodel:ws ftp serverscope:eqversion:1.0.3

Trust: 0.9

vendor:ipswitchmodel:ws ftp serverscope:eqversion:1.0.2

Trust: 0.9

vendor:ipswitchmodel:ws ftp serverscope:eqversion:1.0.1

Trust: 0.9

vendor:ipswitchmodel:ws ftp proscope:eqversion:8.03

Trust: 0.3

vendor:ipswitchmodel:ws ftp proscope:eqversion:8.02

Trust: 0.3

vendor:ipswitchmodel:ws ftp proscope:eqversion:7.5

Trust: 0.3

vendor:ipswitchmodel:ws ftp proscope:eqversion:6.0

Trust: 0.3

vendor:ipswitchmodel:ws ftp serverscope:eqversion:4.02

Trust: 0.3

vendor:ipswitchmodel:ws ftp serverscope:eqversion:4.0

Trust: 0.3

vendor:ipswitchmodel:ws ftp serverscope:eqversion:3.4

Trust: 0.3

vendor:ipswitchmodel:ws ftp serverscope:eqversion:3.1.3

Trust: 0.3

vendor:ipswitchmodel:ws ftp serverscope:eqversion:3.1.2

Trust: 0.3

vendor:ipswitchmodel:ws ftp serverscope:eqversion:3.1.1

Trust: 0.3

vendor:ipswitchmodel:ws ftp serverscope:eqversion:3.1

Trust: 0.3

vendor:ipswitchmodel:ws ftp serverscope:eqversion:3.01

Trust: 0.3

vendor:ipswitchmodel:ws ftp serverscope:eqversion:3.0

Trust: 0.3

sources: BID: 9953 // CNNVD: CNNVD-200412-199 // NVD: CVE-2004-1848

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2004-1848
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200412-199
value: MEDIUM

Trust: 0.6

VULHUB: VHN-10277
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2004-1848
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-10277
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-10277 // CNNVD: CNNVD-200412-199 // NVD: CVE-2004-1848

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.1

sources: VULHUB: VHN-10277 // NVD: CVE-2004-1848

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200412-199

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-200412-199

EXTERNAL IDS

db:BIDid:9953

Trust: 2.0

db:SECTRACKid:1009529

Trust: 1.7

db:SECUNIAid:11206

Trust: 1.7

db:NVDid:CVE-2004-1848

Trust: 1.7

db:OSVDBid:4542

Trust: 1.7

db:CNNVDid:CNNVD-200412-199

Trust: 0.7

db:VULHUBid:VHN-10277

Trust: 0.1

sources: VULHUB: VHN-10277 // BID: 9953 // CNNVD: CNNVD-200412-199 // NVD: CVE-2004-1848

REFERENCES

url:http://www.securityfocus.com/bid/9953

Trust: 1.7

url:http://www.osvdb.org/4542

Trust: 1.7

url:http://securitytracker.com/id?1009529

Trust: 1.7

url:http://secunia.com/advisories/11206

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/15560

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/41831

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=108006717731989&w=2

Trust: 1.6

url:http://www.ipswitch.com/

Trust: 0.3

url:/archive/1/358356

Trust: 0.3

url:/archive/1/358363

Trust: 0.3

url:/archive/1/358357

Trust: 0.3

url:/archive/1/358361

Trust: 0.3

url:http://marc.info/?l=bugtraq&m=108006717731989&w=2

Trust: 0.1

sources: VULHUB: VHN-10277 // BID: 9953 // CNNVD: CNNVD-200412-199 // NVD: CVE-2004-1848

CREDITS

Discovery is credited to Hugh Mann <hughmann@hotmail.com>.

Trust: 0.9

sources: BID: 9953 // CNNVD: CNNVD-200412-199

SOURCES

db:VULHUBid:VHN-10277
db:BIDid:9953
db:CNNVDid:CNNVD-200412-199
db:NVDid:CVE-2004-1848

LAST UPDATE DATE

2024-08-14T14:09:00.079000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-10277date:2019-08-13T00:00:00
db:BIDid:9953date:2004-03-23T00:00:00
db:CNNVDid:CNNVD-200412-199date:2020-05-11T00:00:00
db:NVDid:CVE-2004-1848date:2023-10-11T14:45:44.747

SOURCES RELEASE DATE

db:VULHUBid:VHN-10277date:2004-12-31T00:00:00
db:BIDid:9953date:2004-03-23T00:00:00
db:CNNVDid:CNNVD-200412-199date:2004-12-31T00:00:00
db:NVDid:CVE-2004-1848date:2004-12-31T05:00:00