Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0362: WS_FTP server remote denial of service through cwd command.

0
Medium
VulnerabilityCVE-1999-0362cve-1999-0362denial of service
Published: Tue Feb 02 1999 (02/02/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: ipswitch
Product: ws_ftp_server

Description

WS_FTP server remote denial of service through cwd command.

AI-Powered Analysis

AILast updated: 07/01/2025, 19:56:05 UTC

Technical Analysis

CVE-1999-0362 is a medium-severity vulnerability affecting the WS_FTP Server versions 1.0.1eval and 1.0.2eval, developed by Ipswitch. The vulnerability allows an unauthenticated remote attacker to cause a denial of service (DoS) condition by exploiting the 'cwd' (change working directory) command. Specifically, the server does not properly handle certain inputs to the 'cwd' command, which can cause the server process to crash or become unresponsive, resulting in service disruption. The vulnerability is remotely exploitable without any authentication, and the attack complexity is low, as no special conditions or user interaction are required. The impact is limited to availability, with no direct compromise of confidentiality or integrity reported. No patches or fixes are available for these versions, and there are no known exploits in the wild. Given the age of the affected software versions (published in 1999), this vulnerability primarily concerns legacy systems that may still be in operation in some environments. Modern versions of WS_FTP Server are not indicated as affected by this vulnerability.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential disruption of FTP services that rely on the affected WS_FTP Server versions. FTP servers are often used for file transfers in business operations, and a denial of service could interrupt critical workflows, causing operational delays and potential financial losses. Although the vulnerability does not lead to data breaches or integrity compromise, the unavailability of FTP services can affect business continuity, especially in sectors relying on legacy systems or where FTP remains a critical component of data exchange. Organizations in sectors such as manufacturing, logistics, or government agencies that may still use older FTP server versions could be particularly affected. Additionally, the lack of available patches means that mitigation must rely on other controls or upgrading to supported software versions.

Mitigation Recommendations

Given that no patches are available for the affected versions, European organizations should prioritize the following mitigation steps: 1) Upgrade WS_FTP Server to a supported and patched version that does not contain this vulnerability. 2) If upgrading is not immediately possible, restrict access to the FTP server by implementing network-level controls such as firewall rules to limit connections to trusted IP addresses only. 3) Monitor FTP server logs and network traffic for unusual or repeated 'cwd' command usage that could indicate attempted exploitation. 4) Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect and block malformed FTP commands targeting this vulnerability. 5) Where feasible, replace FTP with more secure file transfer protocols (e.g., SFTP or FTPS) that provide encryption and better security controls. 6) Implement robust incident response plans to quickly address any service disruptions caused by potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7dede9

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 7:56:05 PM

Last updated: 2/7/2026, 11:07:40 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats