| VID |
16068 |
| Severity |
40 |
| Port |
21 |
| Protocol |
TCP |
| Class |
FTP |
| Detailed Description |
The WU-FTPD, according to its version number, has 'chmod' and S/Key Vulnerabilities. WU-FTPD (Washington University FTP daemon) is a FTP server based on the BSD FTP daemon for Linux distributions. WU-FTPD 2.6.2 and earlier are vulnerable to two vulnerabilities below:
1. 'chmod' command - When configured with "restricted-gid home" feature supported by WU-FTPD, an unauthorized user could use this flaw to circumvent the configured home directory restriction. 2. S/Key login handling - On servers using S/Key authentication, a remote attacker could overflow a buffer and potentially execute arbitrary code.
* Note: This check solely relied on the version number of the remote FTP server to assess this vulnerability, so this might be a false positive.
* References: http://www.ciac.org/ciac/bulletins/o-095.shtml http://secunia.com/advisories/11055/
* Platforms Affected: Washington University wu-ftpd 2.6.2 and earlier Red Hat Advanced Workstation 2.1 Red Hat Enterprise Linux 2.1AS Red Hat Enterprise Linux 2.1ES Debian Linux 3.0 Linux Any version |
| Recommendation |
Apply the patch available at ftp://ftp.wu-ftpd.org/pub/wu-ftpd/patches/apply_to_2.6.2/skeychallenge.patch
-- OR --
Upgrade to WU-FTPD version 2.6.3 or later, when new fixed version becomes available from the WU-FTP Web site at http://www.wu-ftpd.org
For Debian GNU/Linux 3.0 (woody): Upgrade to the latest wu-ftpd package (2.6.2-3woody4 or later), as listed in Debian Security Advisory DSA-457-1 at http://www.debian.org/security/2004/dsa-457
For Red Hat Linux: Upgrade to the latest wu-ftpd package, as listed in Red Hat Security Advisory RHSA-2004:096-09 at https://rhn.redhat.com/errata/RHSA-2004-096.html
For other distributions: Contact your vendor for upgrade or patch information. |
| Related URL |
CVE-2004-0148 (CVE) |
| Related URL |
9832 (SecurityFocus) |
| Related URL |
15423 (ISS) |
|