Washington University

Wu-ftpd

21 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 26.55%
  • Veröffentlicht 02.05.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The wu_fnmatch function in wu_fnmatch.c in wu-ftpd 2.6.1 and 2.6.2 allows remote attackers to cause a denial of service (CPU exhaustion by recursion) via a glob pattern with a large number of * (wildcard) characters, as demonstrated using the dir com...

  • EPSS 0.03%
  • Veröffentlicht 15.04.2004 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead.

Exploit
  • EPSS 7.27%
  • Veröffentlicht 15.03.2004 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in the skey_challenge function in ftpd.c for wu-ftp daemon (wu-ftpd) 2.6.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a s/key (SKEY) request with a long name.

  • EPSS 0.54%
  • Veröffentlicht 31.12.2003 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

ftpd.c in wu-ftpd 2.6.2, when running on "operating systems that only allow one non-connected socket bound to the same local address," does not close failed connections, which allows remote attackers to cause a denial of service.

  • EPSS 1.31%
  • Veröffentlicht 31.12.2003 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with...

  • EPSS 0.23%
  • Veröffentlicht 17.11.2003 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd.

Exploit
  • EPSS 2.44%
  • Veröffentlicht 17.11.2003 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd.

Exploit
  • EPSS 73.51%
  • Veröffentlicht 30.11.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

wu-ftpd 2.6.1 allows remote attackers to execute arbitrary commands via a "~{" argument to commands such as CWD, which is not properly handled by the glob function (ftpglob).

  • EPSS 0.33%
  • Veröffentlicht 28.11.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Vulnerability in wu-ftpd 2.6.0, and possibly earlier versions, which is unrelated to the ftpglob bug described in CVE-2001-0550.

Exploit
  • EPSS 8.09%
  • Veröffentlicht 26.03.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Format string vulnerability in wu-ftp 2.6.1 and earlier, when running with debug mode enabled, allows remote attackers to execute arbitrary commands via a malformed argument that is recorded in a PASV port assignment.