| VID |
16074 |
| Severity |
40 |
| Port |
21 |
| Protocol |
TCP |
| Class |
FTP |
| Detailed Description |
The WU-FTPD server, according to its version number, has a format string vulnerability when running in debug mode. WU-FTPD versions 2.6.1 and earlier could allow a remote attacker to execute arbitrary code on the system, due to a format string vulnerability, when WU-FTPD is running in debug mode. When running in debug mode, Wu-ftpd logs user activity to syslog in an insecure manner. A remote attacker with control over the server's hostname resolving facility could exploit this vulnerability to get root access remotely on the affected host.
* Note: This check solely relied on the version number of the remote WU-FTP server to assess this vulnerability, so this might be a false positive.
* References: http://www.cert.org/advisories/CA-2001-33.html http://www.kb.cert.org/vuls/id/639760
* Platforms Affected: Washington University, wu-ftpd 2.6.1 and earlier Unix Any version Linux Any version |
| Recommendation |
Apply the patch available at ftp://ftp.wu-ftpd.org/pub/wu-ftpd/patches/apply_to_current/missing_format_strings.patch
-- OR --
Upgrade to the latest version of WU-FTPD (2.6.2 or later), available from the WU-FTPD Web site at http://www.wu-ftpd.org
For Debian Linux 2.2 (alias potato): Upgrade to the latest version of wu-ftpd (2.6.0 or later), as listed in Debian Security Advisory DSA-016-3 at http://www.debian.org/security/2001/dsa-016
For HP-UX 11.00 and 11.11: Upgrade to the latest version of wu-ftpd, as listed in Hewlett-Packard Company Security Bulletin HPSBUX0201-180 at http://online.securityfocus.com/advisories/3812
For other distributions: Contact your vendor for upgrade or patch information. |
| Related URL |
CVE-2001-0187 (CVE) |
| Related URL |
2296 (SecurityFocus) |
| Related URL |
6020 (ISS) |
|