![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-0256 – WU-FTPD 2.6.2 - File Globbing Denial of Service
https://notcve.org/view.php?id=CVE-2005-0256
25 Feb 2005 — The wu_fnmatch function in wu_fnmatch.c in wu-ftpd 2.6.1 and 2.6.2 allows remote attackers to cause a denial of service (CPU exhaustion by recursion) via a glob pattern with a large number of * (wildcard) characters, as demonstrated using the dir command. • https://www.exploit-db.com/exploits/842 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-0148
https://notcve.org/view.php?id=CVE-2004-0148
15 Apr 2004 — wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead. wu-ftpd 2.6.2 y anteriores, con la opción restricted-gid activada, permite a usuarios locales saltarse restricciones de acceso cambiando los permisos para impedir el acceso a su directorio home, lo que hace que wu-ftpd use el directorio raíz en su lugar. • http://marc.info/?l=bugtraq&m=108999466902690&w=2 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-0185
https://notcve.org/view.php?id=CVE-2004-0185
15 Mar 2004 — Buffer overflow in the skey_challenge function in ftpd.c for wu-ftp daemon (wu-ftpd) 2.6.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a s/key (SKEY) request with a long name. Desbordamiento de búfer en la función skey_challenge en ftpd.c de wu-ftp daemon (wu-ftpd) 2.6.2 permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante una petición s/key (SKEY) con un nombre muy grande. • ftp://ftp.wu-ftpd.org/pub/wu-ftpd/patches/apply_to_2.6.2/skeychallenge.patch •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2003-1327
https://notcve.org/view.php?id=CVE-2003-1327
31 Dec 2003 — Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator. • http://archives.neohapsis.com/archives/bugtraq/2003-09/0348.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2003-1329
https://notcve.org/view.php?id=CVE-2003-1329
31 Dec 2003 — ftpd.c in wu-ftpd 2.6.2, when running on "operating systems that only allow one non-connected socket bound to the same local address," does not close failed connections, which allows remote attackers to cause a denial of service. • ftp://ftp.wu-ftpd.org/pub/wu-ftpd/patches/apply_to_2.6.2/connect-dos.patch •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2003-0854 – WU-FTPD 2.6.2 - 'wuftpd-freezer.c' Remote Denial of Service
https://notcve.org/view.php?id=CVE-2003-0854
25 Oct 2003 — ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd. ls en los paquetes fileutils o coreutils permite a usuarios locales consumir una gran cantidad de memoria mediante un valor -w, lo que puede ser explotado remotamente mediante aplicaciones que usan ls, com wu-ftpd. • https://www.exploit-db.com/exploits/115 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2003-0853 – Coreutils 4.5.x - LS Width Argument Integer Overflow
https://notcve.org/view.php?id=CVE-2003-0853
25 Oct 2003 — An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd. Un desbordamiento de enteros en ls en los paquetes fileutils o coreutils puede permitir a usuarios locales causar una denegación de servicio o ejecutar código arbitrario mediante un valor -w, lo que podría ser explotado remotamente mediante aplicaciones que usan ls, ... • https://www.exploit-db.com/exploits/23274 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2003-0466 – FreeBSD 4.8 - 'realpath()' Off-by-One Buffer Overflow
https://notcve.org/view.php?id=CVE-2003-0466
01 Aug 2003 — Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow attackers to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buffer overflow, including (1) STOR, (2) RETR, (3) APPE, (4) DELE, (5) MKD, (6) RMD, (7) STOU, or (8) RNTO. Error de fuera-por-uno (off-by-one) en la función fb_realpath(), derivada de la función realpath de BSD, pude permitir a atacantes ejecutar código... • https://www.exploit-db.com/exploits/22976 • CWE-193: Off-by-one Error •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2001-0550 – WU-FTPD 2.6.1 - Remote Command Execution
https://notcve.org/view.php?id=CVE-2001-0550
30 Nov 2001 — wu-ftpd 2.6.1 allows remote attackers to execute arbitrary commands via a "~{" argument to commands such as CWD, which is not properly handled by the glob function (ftpglob). • https://www.exploit-db.com/exploits/348 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2001-0935
https://notcve.org/view.php?id=CVE-2001-0935
28 Nov 2001 — Vulnerability in wu-ftpd 2.6.0, and possibly earlier versions, which is unrelated to the ftpglob bug described in CVE-2001-0550. • http://www.novell.com/linux/security/advisories/2001_043_wuftpd_txt.html •