Korean
<< Back
VID 16076
Severity 30
Port 21
Protocol TCP
Class FTP
Detailed Description The WU-FTPD server, according to its version number, may allow a malicious user to overwrite arbitrary files via the RNFR command. WU-FTPD versions 2.4.1 and earlier could allow a remote authenticated attacker to overwrite any file on the affected system as root, resulting in a loss of integrity. This flaw can be triggered when an attacker sends a specially formed rnfr command.

* Note: This check solely relied on the version number of the remote WU-FTP server to assess this vulnerability, so this might be a false positive.

* References:
http://www.osvdb.org/displayvuln.php?osvdb_id=8717

* Platforms Affected:
Washington University, wu-ftpd 2.4.1 and earlier
Unix Any version
Linux Any version
Recommendation Upgrade to the latest version of WU-FTPD (2.4.2 or later), available from the WU-FTPD Web site at http://www.wu-ftpd.org
Related URL CVE-1999-0081 (CVE)
Related URL (SecurityFocus)
Related URL 324 (ISS)