// For flags

CVE-2005-0312

War FTP Daemon 1.8 - Remote Denial of Service

Severity Score

2.1
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

WarFTPD 1.82 RC9, when running as an NT service, allows remote authenticated users to cause a denial of service (access violation) via a CWD command with a crafted pathname, as demonstrated using a large string of "%s" sequences, possibly indicating a format string vulnerability.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2005-01-27 CVE Published
  • 2005-01-27 First Exploit
  • 2005-02-10 CVE Reserved
  • 2024-01-18 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
War Ftp Daemon
Search vendor "War Ftp Daemon"
War Ftp Daemon
Search vendor "War Ftp Daemon" for product "War Ftp Daemon"
1.8
Search vendor "War Ftp Daemon" for product "War Ftp Daemon" and version "1.8"
-
Affected
War Ftp Daemon
Search vendor "War Ftp Daemon"
War Ftp Daemon
Search vendor "War Ftp Daemon" for product "War Ftp Daemon"
1.82_rc9
Search vendor "War Ftp Daemon" for product "War Ftp Daemon" and version "1.82_rc9"
-
Affected