Korean
<< Back
VID 16078
Severity 40
Port 21
Protocol TCP
Class FTP
Detailed Description The WU-FTPD server, according to its version number, has a privilege escalation vulnerability via the ABOR command. WU-FTPD is an ftp server based on the BSD ftpd that is maintained by Washington University. WU-FTPD versions 2.4.1 and earlier contain a flaw that may allow a remote authenticated attacker to gain access to unauthorized privileges. This flaw can be exploited when an ftp client is transferring a file, then closes the connection and sends an ABOR command, which causes the server to execute the dologout() function, allowing the attacker to gain root privileges.

* Note: This check solely relied on the version number of the remote WU-FTP server to assess this vulnerability, so this might be a false positive.

* References:
http://archives.neohapsis.com/archives/bugtraq/1997_1/0007.html
http://www.osvdb.org/displayvuln.php?osvdb_id=8718
http://archives.neohapsis.com/archives/bugtraq/1997_1/0014.html

* Platforms Affected:
Washington University, wu-ftpd 2.4.1 and earlier
Unix Any version
Linux Any version
Recommendation Upgrade to the latest version of WU-FTPD (2.4.2 or later), available from the WU-FTPD Web site at http://www.wu-ftpd.org
Related URL CVE-1999-1326 (CVE)
Related URL (SecurityFocus)
Related URL 7169 (ISS)