Vulnerabilities > CVE-2001-0550
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
wu-ftpd 2.6.1 allows remote attackers to execute arbitrary commands via a "~{" argument to commands such as CWD, which is not properly handled by the glob function (ftpglob).
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 | |
Application | 3 |
Exploit-Db
description Wu-Ftpd 2.6 File Globbing Heap Corruption Vulnerability. CVE-2001-0550. Remote exploit for unix platform id EDB-ID:21161 last seen 2016-02-02 modified 2001-11-27 published 2001-11-27 reporter Core Security Technologies source https://www.exploit-db.com/download/21161/ title Wu-Ftpd 2.6 File Globbing Heap Corruption Vulnerability description wu-ftpd <= 2.6.1 Remote Root Exploit. CVE-2001-0550. Remote exploit for linux platform id EDB-ID:348 last seen 2016-01-31 modified 2002-05-14 published 2002-05-14 reporter Teso source https://www.exploit-db.com/download/348/ title wu-ftpd <= 2.6.1 - Remote Root Exploit
Nessus
NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2001-090.NASL description A vulnerability in wu-ftpd last seen 2020-06-01 modified 2020-06-02 plugin id 13903 published 2004-07-31 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/13903 title Mandrake Linux Security Advisory : wu-ftpd (MDKSA-2001:090) NASL family FTP NASL id FTPGLOB.NASL description The FTPD glob vulnerability manifests itself in handling the glob command. The problem is not a typical buffer overflow or format string vulnerability, but a combination of two bugs - an implementation of the glob command that does not properly return an error condition when interpreting the string last seen 2020-06-01 modified 2020-06-02 plugin id 10821 published 2001-12-06 reporter Copyright (C) 2001-2018 E*Maze source https://www.tenable.com/plugins/nessus/10821 title Multiple FTPD glob Command Arbitrary Command Execution NASL family Debian Local Security Checks NASL id DEBIAN_DSA-087.NASL description CORE ST reports that an exploit has been found for a bug in the wu-ftpd glob code (this is the code that handles filename wildcard expansion). Any logged in user (including anonymous FTP users) can exploit the bug to gain root privileges on the server. last seen 2020-06-01 modified 2020-06-02 plugin id 14924 published 2004-09-29 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/14924 title Debian DSA-087-1 : wu-ftpd - remote root exploit
Redhat
advisories |
|
References
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000442
- http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-036-01
- http://marc.info/?l=bugtraq&m=100700363414799&w=2
- http://www.caldera.com/support/security/advisories/CSSA-2001-041.0.txt
- http://www.cert.org/advisories/CA-2001-33.html
- http://www.debian.org/security/2001/dsa-087
- http://www.kb.cert.org/vuls/id/886083
- http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-090.php3
- http://www.novell.com/linux/security/advisories/2001_043_wuftpd_txt.html
- http://www.redhat.com/support/errata/RHSA-2001-157.html
- http://www.securityfocus.com/archive/82/180823
- http://www.securityfocus.com/bid/3581
- http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0107-162
- https://exchange.xforce.ibmcloud.com/vulnerabilities/7611