Format string vulnerability in Ipswitch WS_FTP Professional 12 before 12.2 allows remote attackers to cause a denial of service (crash) via format string specifiers in the status code portion of an HTTP response.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://docs.ipswitch.com/WS_FTP%20122/ReleaseNotes/English/index.htm?k_id=ipswitch_com_ftp_documents_worldwide_ws_ftp122releasenotesenglish#link23 - | |
References | () http://www.exploit-db.com/exploits/9607 - | |
References | () http://www.packetstormsecurity.org/0909-exploits/nocoolnameforawsftppoc.pl.txt - Exploit | |
References | () http://www.securityfocus.com/bid/36297 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/53098 - |
Information
Published : 2010-04-21 14:30
Updated : 2024-11-21 01:10
NVD link : CVE-2009-4775
Mitre link : CVE-2009-4775
CVE.ORG link : CVE-2009-4775
JSON object : View
Products Affected
ipswitch
- ws_ftp
CWE
CWE-134
Use of Externally-Controlled Format String