7.9 High
AI Score
Confidence
Low
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.004 Low
EPSS
Percentile
74.8%
Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator.
CPE | Name | Operator | Version |
---|---|---|---|
washington_university:wu-ftpd | washington university wu-ftpd | le | 2.6.2 |
archives.neohapsis.com/archives/bugtraq/2003-09/0348.html
secunia.com/advisories/9835
securitytracker.com/id?1007775
www.osvdb.org/2594
www.securityfocus.com/bid/8668
www.slackware.org/security/viewer.php?l=slackware-security&y=2003&m=slackware-security.365971
exchange.xforce.ibmcloud.com/vulnerabilities/13269