CVE-2004-1848

Ipswitch WS_FTP Server 4.0.2 allows remote attackers to cause a denial of service (disk consumption) and bypass file size restrictions via a REST command with a large size argument, followed by a STOR of a smaller file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ipswitch:ws_ftp_server:3.0_1:*:*:*:*:*:*:*
cpe:2.3:a:ipswitch:ws_ftp_server:4.01:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:2.0:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:3.0:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:3.1:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:4.0:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*

History

11 Oct 2023, 14:45

Type Values Removed Values Added
First Time Progress ws Ftp Server
CPE cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0:*:*:*:*:*:*:*
cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.0:*:*:*:*:*:*:*
cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1:*:*:*:*:*:*:*
cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0:*:*:*:*:*:*:*
cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.4:*:*:*:*:*:*:*
cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:2.0:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:3.0:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:4.0:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:3.1:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:progress:ws_ftp_server:3.1.2:*:*:*:*:*:*:*

Information

Published : 2004-12-31 05:00

Updated : 2023-12-10 10:17


NVD link : CVE-2004-1848

Mitre link : CVE-2004-1848

CVE.ORG link : CVE-2004-1848


JSON object : View

Products Affected

progress

  • ws_ftp_server

ipswitch

  • ws_ftp_server
CWE
CWE-399

Resource Management Errors