10

CVE-2003-0466

Exploit

Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow attackers to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buffer overflow, including (1) STOR, (2) RETR, (3) APPE, (4) DELE, (5) MKD, (6) RMD, (7) STOU, or (8) RNTO.

Data is provided by the National Vulnerability Database (NVD)
RedhatWu Ftpd Version2.6.1-16
WuftpdWu-ftpd Version >= 2.5.0 <= 2.6.2
ApplemacOS X Version10.2.6
ApplemacOS X Server Version10.2.6
FreebsdFreebsd Version >= 4.0 <= 5.0
NetbsdNetbsd Version >= 1.5 <= 1.6.1
OpenbsdOpenbsd Version >= 2.0 <= 3.3
SunSolaris Version9.0 SwPlatformsparc
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 90.83% 0.996
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
CWE-193 Off-by-one Error

A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.

http://securitytracker.com/id?1007380
Third Party Advisory
Broken Link
VDB Entry
http://www.kb.cert.org/vuls/id/743092
Third Party Advisory
US Government Resource
http://www.securityfocus.com/archive/1/424852/100/0/threaded
Third Party Advisory
Broken Link
VDB Entry
http://www.securityfocus.com/archive/1/425061/100/0/threaded
Third Party Advisory
Broken Link
VDB Entry
http://www.securityfocus.com/bid/8315
Patch
Third Party Advisory
Vendor Advisory
Exploit
Broken Link
VDB Entry