|Title:||Ipswitch WS_FTP Professional Local Buffer Overflow Vulnerability|
|Summary:||This host is installed with Ipswitch WS_FTP; Professional and is prone to local buffer overflow vulnerability.|
This host is installed with Ipswitch WS_FTP
Professional and is prone to local buffer overflow vulnerability.
The flaw exists due to error in the
application where some fields (local search and backup locations) allows
users to input data and are not properly sanitized.
Successful exploitation will allow
local attackers to conduct buffer overflow attacks on the affected system.
Impact Level: Application
Ipswitch WS_FTP Professional prior to
Upgrade to Ipswitch WS_FTP Professional
version 184.108.40.206 or later. For updates refer to https://www.ipswitch.com
Common Vulnerability Exposure (CVE) ID: CVE-2017-16513|
|Copyright||Copyright (C) 2017 Greenbone Networks GmbH|
|This is only one of 68714 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.