Description
Ipswitch WS_FTP Server 4.0.2 allows remote attackers to cause a denial of service (disk consumption) and bypass file size restrictions via a REST command with a large size argument, followed by a STOR of a smaller file.
Product(s):
- Ipswitch WS FTP Server 3.0_1
- Ipswitch WS FTP Server 4.01
- Progress WS_FTP Server 1.0.1
- Progress WS_FTP Server 1.0.2
- Progress WS_FTP Server 1.0.3
- Progress WS_FTP Server 1.0.4
- Progress WS_FTP Server 1.0.5
- Progress WS_FTP Server 2.0.1
- Progress WS_FTP Server 2.0.2
- Progress WS_FTP Server 2.0.3
- Progress WS_FTP Server 2.0.4
- Progress WS_FTP Server 2.0
- Progress WS_FTP Server 3.0
- Progress WS_FTP Server 3.1.1
- Progress WS_FTP Server 3.1.2
- Progress WS_FTP Server 3.1.3
- Progress WS_FTP Server 3.1
- Progress WS_FTP Server 3.4
- Progress WS_FTP Server 4.0.2
- Progress WS_FTP Server 4.0
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-1848, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-1848 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.