{"vuid":"VU#415828","idnumber":"415828","name":"Microsoft Windows FTP client does not properly validate received file names","keywords":["Microsoft","Windows","FTP Client","input validation error","remote code execution","file names","FTP servers","MS05-044"],"overview":"An input validation error in the Microsoft Windows FTP Client may allow a remote attacker to write files to arbitrary locations and may allow the execution of arbitrary code.","clean_desc":"The Microsoft Windows FTP Client does not properly validate the names of received files. If a remote attacker can persuade a user to download a file with a specially crafted name using the Windows FTP Client, that attacker may be able to write that file to an arbitrary location on the users system. In order to exploit this vulnerability, the crafted file name must  map to an existing location on the user's system. Note that this vulnerability may allow a remote attacker to execute arbitrary code. For instance, an attacker may be able to leverage this vulnerability to download an arbitrary file to the Startup folder. If the downloaded file is executable, then that file will be executed the next time a user logs in. For more information, including a list of affected software, please see MS05-044. Please note that exploit code for this vulnerability is publicly available.","impact":"A remote attacker may be able to write files to arbitrary locations on a vulnerable system. If the target location is the Startup folder, then it is possible to cause arbitrary code to be automatically executed the next time the user logs in.","resolution":"Apply a patch\nMicrosoft has addressed this issue in Microsoft Security Bulletin MS05-044.","workarounds":"Do not download files from untrusted sources By only downloading files from trusted sources, the chances of exploitation are reduced.","sysaffected":"","thanks":"This vulnerability was reported by Microsoft in \nMS05-044","author":"This document was written by Jeff Gennari.","public":["http://www.microsoft.com/technet/security/Bulletin/MS05-044.mspx","http://secunia.com/advisories/17163/"],"cveids":["CVE-2005-2126"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-10-11T18:32:06Z","publicdate":"2005-10-11T00:00:00Z","datefirstpublished":"2005-10-13T13:08:40Z","dateupdated":"2005-10-14T12:44:17Z","revision":42,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"20","cam_impact":"12","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"16.2","cam_scorecurrentwidelyknown":"20.7","cam_scorecurrentwidelyknownexploited":"38.7","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":16.2,"vulnote":null}