Korean
<< Back
VID 16077
Severity 40
Port 21
Protocol TCP
Class FTP
Detailed Description The WU-FTPD server, according to its version number, has a MAIL_ADMIN Configuration Buffer Overflow Vulnerability.
Washington University's FTP daemon (WU-FTPD) is an FTP server included with most Linux distributions. WU-FTPD version 2.6.2 and earlier (with the MAIL_DOWN option) are vulnerable to a stack-based buffer overflow vulnerability, caused by insufficient bounds checking when handling input within the SockPrintf() function in the "ftpd.c" file. By uploading a large file to overflow a buffer if a remote authenticated attacker have a file upload privileges, they could execute code on the system with privileges of the WU-FTPD process.

* Note: This check solely relied on the version number of the remote WU-FTP server to assess this vulnerability, so this might be a false positive.

* References:
http://www.osvdb.org/displayvuln.php?osvdb_id=2594
http://securitytracker.com/alerts/2003/Sep/1007775.html
http://archives.neohapsis.com/archives/bugtraq/2003-09/0348.html
http://secunia.com/advisories/9835

* Platforms Affected:
Washington University, wu-ftpd 2.6.2, 2.6.1, 2.6.0
Unix Any version
Linux Any version
Recommendation Upgrade to WU-FTPD version 2.6.3 or later, when new fixed version becomes available from the WU-FTPD Web site at http://www.wu-ftpd.org

For Slackware:
Upgrade to the latest wu-ftpd package, as listed in Slackware security advisory (SSA:2003-259-03) at
http://www.slackware.org/security/viewer.php?l=slackware-security&y=2003&m=slackware-security.365971

As a workaround, don't compile wu-ftpd with MAIL_ADMIN defined/enabled (by default, MAIL_ADMIN is not defined) if it is not required.
Related URL CVE-2003-1327 (CVE)
Related URL 8668 (SecurityFocus)
Related URL 13269 (ISS)