// For flags

CVE-1999-0368

WU-FTPD 2.4.2 / SCO Open Server 5.0.5 / ProFTPd 1.2 pre1 - 'realpath' Remote Buffer Overflow

Severity Score

10.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 1999-02-09 CVE Published
  • 1999-02-09 First Exploit
  • 1999-06-07 CVE Reserved
  • 2024-02-08 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Proftpd Project
Search vendor "Proftpd Project"
Proftpd
Search vendor "Proftpd Project" for product "Proftpd"
1.2_pre1
Search vendor "Proftpd Project" for product "Proftpd" and version "1.2_pre1"
-
Affected
Washington University
Search vendor "Washington University"
Wu-ftpd
Search vendor "Washington University" for product "Wu-ftpd"
2.4.2_beta18
Search vendor "Washington University" for product "Wu-ftpd" and version "2.4.2_beta18"
-
Affected
Washington University
Search vendor "Washington University"
Wu-ftpd
Search vendor "Washington University" for product "Wu-ftpd"
2.4.2_beta18_vr9
Search vendor "Washington University" for product "Wu-ftpd" and version "2.4.2_beta18_vr9"
-
Affected
Caldera
Search vendor "Caldera"
Openlinux
Search vendor "Caldera" for product "Openlinux"
1.3
Search vendor "Caldera" for product "Openlinux" and version "1.3"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
2.0
Search vendor "Debian" for product "Debian Linux" and version "2.0"
-
Affected
Redhat
Search vendor "Redhat"
Linux
Search vendor "Redhat" for product "Linux"
5.0
Search vendor "Redhat" for product "Linux" and version "5.0"
-
Affected
Redhat
Search vendor "Redhat"
Linux
Search vendor "Redhat" for product "Linux"
5.1
Search vendor "Redhat" for product "Linux" and version "5.1"
-
Affected
Sco
Search vendor "Sco"
Openserver
Search vendor "Sco" for product "Openserver"
5.0
Search vendor "Sco" for product "Openserver" and version "5.0"
-
Affected
Sco
Search vendor "Sco"
Openserver
Search vendor "Sco" for product "Openserver"
5.0.2
Search vendor "Sco" for product "Openserver" and version "5.0.2"
-
Affected
Sco
Search vendor "Sco"
Openserver
Search vendor "Sco" for product "Openserver"
5.0.3
Search vendor "Sco" for product "Openserver" and version "5.0.3"
-
Affected
Sco
Search vendor "Sco"
Openserver
Search vendor "Sco" for product "Openserver"
5.0.4
Search vendor "Sco" for product "Openserver" and version "5.0.4"
-
Affected
Sco
Search vendor "Sco"
Openserver
Search vendor "Sco" for product "Openserver"
5.0.5
Search vendor "Sco" for product "Openserver" and version "5.0.5"
-
Affected
Sco
Search vendor "Sco"
Unixware
Search vendor "Sco" for product "Unixware"
7.0
Search vendor "Sco" for product "Unixware" and version "7.0"
-
Affected
Sco
Search vendor "Sco"
Unixware
Search vendor "Sco" for product "Unixware"
7.0.1
Search vendor "Sco" for product "Unixware" and version "7.0.1"
-
Affected
Slackware
Search vendor "Slackware"
Slackware Linux
Search vendor "Slackware" for product "Slackware Linux"
3.4
Search vendor "Slackware" for product "Slackware Linux" and version "3.4"
-
Affected
Slackware
Search vendor "Slackware"
Slackware Linux
Search vendor "Slackware" for product "Slackware Linux"
3.5
Search vendor "Slackware" for product "Slackware Linux" and version "3.5"
-
Affected
Slackware
Search vendor "Slackware"
Slackware Linux
Search vendor "Slackware" for product "Slackware Linux"
3.6
Search vendor "Slackware" for product "Slackware Linux" and version "3.6"
-
Affected