Korean
<< Back
VID 16074
Severity 40
Port 21
Protocol TCP
Class FTP
Detailed Description The WU-FTPD server, according to its version number, has a format string vulnerability when running in debug mode. WU-FTPD versions 2.6.1 and earlier could allow a remote attacker to execute arbitrary code on the system, due to a format string vulnerability, when WU-FTPD is running in debug mode. When running in debug mode, Wu-ftpd logs user activity to syslog in an insecure manner. A remote attacker with control over the server's hostname resolving facility could exploit this vulnerability to get root access remotely on the affected host.

* Note: This check solely relied on the version number of the remote WU-FTP server to assess this vulnerability, so this might be a false positive.

* References:
http://www.cert.org/advisories/CA-2001-33.html
http://www.kb.cert.org/vuls/id/639760

* Platforms Affected:
Washington University, wu-ftpd 2.6.1 and earlier
Unix Any version
Linux Any version
Recommendation Apply the patch available at ftp://ftp.wu-ftpd.org/pub/wu-ftpd/patches/apply_to_current/missing_format_strings.patch

-- OR --

Upgrade to the latest version of WU-FTPD (2.6.2 or later), available from the WU-FTPD Web site at http://www.wu-ftpd.org

For Debian Linux 2.2 (alias potato):
Upgrade to the latest version of wu-ftpd (2.6.0 or later), as listed in Debian Security Advisory DSA-016-3 at http://www.debian.org/security/2001/dsa-016

For HP-UX 11.00 and 11.11:
Upgrade to the latest version of wu-ftpd, as listed in Hewlett-Packard Company Security Bulletin HPSBUX0201-180 at http://online.securityfocus.com/advisories/3812

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2001-0187 (CVE)
Related URL 2296 (SecurityFocus)
Related URL 6020 (ISS)