vendor:
WFTPD Pro
by:
Len Budney
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: WFTPD Pro
Affected Version From: Windows NT 4.0 with either SP3, SP4, or SP6 installed.
Affected Version To: Windows NT 4.0 with either SP3, SP4, or SP6 installed.
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2001
WFTPD Pro 3.00 R4 Buffer Overflow
Invalid long strings submitted using either 'RETR' or 'CWD' commands to a host running WFTPD server, will result in the service terminating due to a buffer overflow. It may be possible for an attacker to execute arbitrary code through this vulnerability. The problem exists due to the interaction between WFTPD.EXE and the Windows function call 'NTDLL.DLL:RtlFreeHeap()'.
Mitigation:
Restart the server to gain normal functionality.