Vulnerabilities > CVE-2001-0550

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
david-madore
washington-university
nessus
exploit available

Summary

wu-ftpd 2.6.1 allows remote attackers to execute arbitrary commands via a "~{" argument to commands such as CWD, which is not properly handled by the glob function (ftpglob).

Exploit-Db

  • descriptionWu-Ftpd 2.6 File Globbing Heap Corruption Vulnerability. CVE-2001-0550. Remote exploit for unix platform
    idEDB-ID:21161
    last seen2016-02-02
    modified2001-11-27
    published2001-11-27
    reporterCore Security Technologies
    sourcehttps://www.exploit-db.com/download/21161/
    titleWu-Ftpd 2.6 File Globbing Heap Corruption Vulnerability
  • descriptionwu-ftpd <= 2.6.1 Remote Root Exploit. CVE-2001-0550. Remote exploit for linux platform
    idEDB-ID:348
    last seen2016-01-31
    modified2002-05-14
    published2002-05-14
    reporterTeso
    sourcehttps://www.exploit-db.com/download/348/
    titlewu-ftpd <= 2.6.1 - Remote Root Exploit

Nessus

  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2001-090.NASL
    descriptionA vulnerability in wu-ftpd
    last seen2020-06-01
    modified2020-06-02
    plugin id13903
    published2004-07-31
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/13903
    titleMandrake Linux Security Advisory : wu-ftpd (MDKSA-2001:090)
  • NASL familyFTP
    NASL idFTPGLOB.NASL
    descriptionThe FTPD glob vulnerability manifests itself in handling the glob command. The problem is not a typical buffer overflow or format string vulnerability, but a combination of two bugs - an implementation of the glob command that does not properly return an error condition when interpreting the string
    last seen2020-06-01
    modified2020-06-02
    plugin id10821
    published2001-12-06
    reporterCopyright (C) 2001-2018 E*Maze
    sourcehttps://www.tenable.com/plugins/nessus/10821
    titleMultiple FTPD glob Command Arbitrary Command Execution
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-087.NASL
    descriptionCORE ST reports that an exploit has been found for a bug in the wu-ftpd glob code (this is the code that handles filename wildcard expansion). Any logged in user (including anonymous FTP users) can exploit the bug to gain root privileges on the server.
    last seen2020-06-01
    modified2020-06-02
    plugin id14924
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/14924
    titleDebian DSA-087-1 : wu-ftpd - remote root exploit

Redhat

advisories
rhsa
idRHSA-2001:157