20 results (0.011 seconds)

CVSS: 5.0EPSS: 7%CPEs: 2EXPL: 2

The wu_fnmatch function in wu_fnmatch.c in wu-ftpd 2.6.1 and 2.6.2 allows remote attackers to cause a denial of service (CPU exhaustion by recursion) via a glob pattern with a large number of * (wildcard) characters, as demonstrated using the dir command. • https://www.exploit-db.com/exploits/842 ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.63/SCOSA-2005.63.txt http://itrc.hp.com/service/cki/docDisplay.do?docId=c00637342 http://secunia.com/advisories/14411 http://secunia.com/advisories/18210 http://secunia.com/advisories/19561 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101699-1 http://sunsolve.sun.com/search/document.do?assetkey=1-26-57795-1 http://www.debian.org/security/2005/dsa-705 http:/&#x • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.2EPSS: 0%CPEs: 23EXPL: 0

wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead. wu-ftpd 2.6.2 y anteriores, con la opción restricted-gid activada, permite a usuarios locales saltarse restricciones de acceso cambiando los permisos para impedir el acceso a su directorio home, lo que hace que wu-ftpd use el directorio raíz en su lugar. • http://marc.info/?l=bugtraq&m=108999466902690&w=2 http://secunia.com/advisories/11055 http://secunia.com/advisories/20168 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102356-1 http://www.debian.org/security/2004/dsa-457 http://www.frsirt.com/english/advisories/2006/1867 http://www.redhat.com/support/errata/RHSA-2004-096.html http://www.securityfocus.com/bid/9832 https://exchange.xforce.ibmcloud.com/vulnerabilities/15423 https://oval.cisecurity.org/repository •

CVSS: 10.0EPSS: 7%CPEs: 1EXPL: 1

Buffer overflow in the skey_challenge function in ftpd.c for wu-ftp daemon (wu-ftpd) 2.6.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a s/key (SKEY) request with a long name. Desbordamiento de búfer en la función skey_challenge en ftpd.c de wu-ftp daemon (wu-ftpd) 2.6.2 permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante una petición s/key (SKEY) con un nombre muy grande. • ftp://ftp.wu-ftpd.org/pub/wu-ftpd/patches/apply_to_2.6.2/skeychallenge.patch http://unixpunx.org/txt/exploits_archive/packetstorm/0310-advisories/wuftpd-skey.txt http://www.debian.org/security/2004/dsa-457 http://www.redhat.com/support/errata/RHSA-2004-096.html http://www.securiteam.com/unixfocus/6X00Q1P8KC.html http://www.securityfocus.com/bid/8893 https://exchange.xforce.ibmcloud.com/vulnerabilities/13518 https://access.redhat.com/security/cve/CVE-2004-0185 https://bugzilla& •

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator. • http://archives.neohapsis.com/archives/bugtraq/2003-09/0348.html http://secunia.com/advisories/9835 http://securitytracker.com/id?1007775 http://www.osvdb.org/2594 http://www.securityfocus.com/bid/8668 http://www.slackware.org/security/viewer.php?l=slackware-security&y=2003&m=slackware-security.365971 https://exchange.xforce.ibmcloud.com/vulnerabilities/13269 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

ftpd.c in wu-ftpd 2.6.2, when running on "operating systems that only allow one non-connected socket bound to the same local address," does not close failed connections, which allows remote attackers to cause a denial of service. • ftp://ftp.wu-ftpd.org/pub/wu-ftpd/patches/apply_to_2.6.2/connect-dos.patch http://www.osvdb.org/34670 https://access.redhat.com/security/cve/CVE-2003-1329 https://bugzilla.redhat.com/show_bug.cgi?id=1617128 •