Vulnerability Details : CVE-2006-4847
Public exploit exists!
Multiple buffer overflows in Ipswitch WS_FTP Server 5.05 before Hotfix 1 allow remote authenticated users to execute arbitrary code via long (1) XCRC, (2) XSHA1, or (3) XMD5 commands.
Vulnerability category: Execute code
Products affected by CVE-2006-4847
- cpe:2.3:a:ipswitch:ws_ftp_server:1.0.2eval:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:ws_ftp_server:1.0.1eval:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:ws_ftp_server:4.01:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:ws_ftp_server:5.03:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:ws_ftp_server:3.0_1:*:*:*:*:*:*:*
- cpe:2.3:a:ipswitch:ws_ftp_server:5.02:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:3.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-4847
90.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2006-4847
-
Ipswitch WS_FTP Server 5.05 XMD5 Overflow
Disclosure Date: 2006-09-14First seen: 2020-04-26exploit/windows/ftp/wsftp_server_505_xmd5This module exploits a buffer overflow in the XMD5 verb in IPSWITCH WS_FTP Server 5.05. Authors: - MC <mc@metasploit.com>
CVSS scores for CVE-2006-4847
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST |
References for CVE-2006-4847
-
http://secunia.com/advisories/21932
About Secunia Research | FlexeraPatch;Vendor Advisory
-
http://ipswitch.com/support/ws_ftp-server/releases/wr505hf1.asp
Progress Community - The One Place for all Our Customers, Partners & EmployeesPatch
-
http://www.vupen.com/english/advisories/2006/3655
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
http://www.osvdb.org/28939
404 Not Found
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/28983
Ipswitch WS_FTP XCRC, XSHA1, and XMD5 command buffer overflow CVE-2006-4847 Vulnerability Report
-
http://www.securityfocus.com/bid/20076
Ipswitch WS_FTP Server XCRC XSHA1 and XMD5 Commands Buffer Overflow Vulnerabilities
Jump to