Ipswitch WS_FTP server version 4.0.2.EVAL has a flaw that allows a remote attacker that ability to read any memory address. With the right address, the user can cause a buffer overflow and execute arbitrary code as SYSTEM.
3cb9ce74977358040d15ba38c7f849fd531dd829829d647e0922398a87feb947
Ipswitch WS_FTP server version 4.0.2.EVAL allows for a local attacker with program execution privileges to run anything with SYSTEM privileges. Full step-by-step exploitation given.
09db33767583c0197cf2fc533a27f68d312a5b5a994ac463fa779980c06c0d47
Ipswitch WS_FTP server version 4.0.2.EVAL allows a remote attacker to fill up the hard disk of the server via the REST command, resulting in a denial of service.
77b6d6329d32b02f40d9fcdb072ee8f5b668c3da6d3aec7a892a5c89f8a6b227
Remote exploit for Ipswitch WS_FTP server version 4.0.2.EVAL that makes use of a buffer overflow in the STAT command.
e993fa25947b8629ad5a12de268189a00ea40196ac545b8061e970e085a73b11
Ipswitch WS_FTP server version 4.0.2.EVAL allows for a remote user with write access to a directory the ability to execute arbitrary code due to a buffer overflow in WS_FTP Server's STAT command when downloading a file the user created.
b865a821c9ab141926df964d0139b73948e886598becc6fb68a6d21a43c17b94