Vulnerability Note VU#415828

Microsoft Windows FTP client does not properly validate received file names

Original Release date: 13 Oct 2005 | Last revised: 14 Oct 2005


An input validation error in the Microsoft Windows FTP Client may allow a remote attacker to write files to arbitrary locations and may allow the execution of arbitrary code.


The Microsoft Windows FTP Client does not properly validate the names of received files. If a remote attacker can persuade a user to download a file with a specially crafted name using the Windows FTP Client, that attacker may be able to write that file to an arbitrary location on the users system. In order to exploit this vulnerability, the crafted file name must map to an existing location on the user's system.

Note that this vulnerability may allow a remote attacker to execute arbitrary code. For instance, an attacker may be able to leverage this vulnerability to download an arbitrary file to the Startup folder. If the downloaded file is executable, then that file will be executed the next time a user logs in.

For more information, including a list of affected software, please see MS05-044. Please note that exploit code for this vulnerability is publicly available.


A remote attacker may be able to write files to arbitrary locations on a vulnerable system. If the target location is the Startup folder, then it is possible to cause arbitrary code to be automatically executed the next time the user logs in.


Apply a patch

Microsoft has addressed this issue in Microsoft Security Bulletin MS05-044

Do not download files from untrusted sources

By only downloading files from trusted sources, the chances of exploitation are reduced.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-12 Oct 2005
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerability was reported by Microsoft in MS05-044.

This document was written by Jeff Gennari.

Other Information

  • CVE IDs: CAN-2005-2126
  • Date Public: 11 Oct 2005
  • Date First Published: 13 Oct 2005
  • Date Last Updated: 14 Oct 2005
  • Severity Metric: 16.20
  • Document Revision: 40


If you have feedback, comments, or additional information about this vulnerability, please send us email.