WU-FTPD Multiple Vulnerabilities (OF, Priv Esc)

critical Nessus Plugin ID 10318

Synopsis

The remote FTP server has a remote buffer overflow vulnerability.

Description

It was possible to make the remote FTP server crash by creating a huge directory structure. This is usually called the 'wu-ftpd buffer overflow' even though it affects other FTP servers.

An attacker can exploit this issue to crash the FTP server, or execute arbitrary code.

Solution

Upgrade to the latest version of the FTP server. Consider removing directories writable by 'anonymous'.

Plugin Details

Severity: Critical

ID: 10318

File Name: wu_ftpd_overflow.nasl

Version: 1.59

Type: remote

Family: FTP

Published: 8/31/1999

Updated: 8/7/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: Settings/ParanoidReport, ftp/login, ftp/writeable_dir

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2/9/1999

Reference Information

CVE: CVE-1999-0368, CVE-1999-0878, CVE-1999-0879, CVE-1999-0950

BID: 113, 599, 747, 2242