| VID |
16076 |
| Severity |
30 |
| Port |
21 |
| Protocol |
TCP |
| Class |
FTP |
| Detailed Description |
The WU-FTPD server, according to its version number, may allow a malicious user to overwrite arbitrary files via the RNFR command. WU-FTPD versions 2.4.1 and earlier could allow a remote authenticated attacker to overwrite any file on the affected system as root, resulting in a loss of integrity. This flaw can be triggered when an attacker sends a specially formed rnfr command.
* Note: This check solely relied on the version number of the remote WU-FTP server to assess this vulnerability, so this might be a false positive.
* References: http://www.osvdb.org/displayvuln.php?osvdb_id=8717
* Platforms Affected: Washington University, wu-ftpd 2.4.1 and earlier Unix Any version Linux Any version |
| Recommendation |
Upgrade to the latest version of WU-FTPD (2.4.2 or later), available from the WU-FTPD Web site at http://www.wu-ftpd.org |
| Related URL |
CVE-1999-0081 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
324 (ISS) |
|