| VID |
16078 |
| Severity |
40 |
| Port |
21 |
| Protocol |
TCP |
| Class |
FTP |
| Detailed Description |
The WU-FTPD server, according to its version number, has a privilege escalation vulnerability via the ABOR command. WU-FTPD is an ftp server based on the BSD ftpd that is maintained by Washington University. WU-FTPD versions 2.4.1 and earlier contain a flaw that may allow a remote authenticated attacker to gain access to unauthorized privileges. This flaw can be exploited when an ftp client is transferring a file, then closes the connection and sends an ABOR command, which causes the server to execute the dologout() function, allowing the attacker to gain root privileges.
* Note: This check solely relied on the version number of the remote WU-FTP server to assess this vulnerability, so this might be a false positive.
* References: http://archives.neohapsis.com/archives/bugtraq/1997_1/0007.html http://www.osvdb.org/displayvuln.php?osvdb_id=8718 http://archives.neohapsis.com/archives/bugtraq/1997_1/0014.html
* Platforms Affected: Washington University, wu-ftpd 2.4.1 and earlier Unix Any version Linux Any version |
| Recommendation |
Upgrade to the latest version of WU-FTPD (2.4.2 or later), available from the WU-FTPD Web site at http://www.wu-ftpd.org |
| Related URL |
CVE-1999-1326 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
7169 (ISS) |
|