Janusz Niewiadomski and Wojciech Purczynski of iSEC Security Research have found a single byte buffer overflow in the Washington University ftp daemon (wuftpd), a widely used ftp server for Linux-like systems. It is yet unclear if this bug is (remotely) exploitable. Positive exploitability may result in a remote root compromise of a system running the wuftpd ftp daemon.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
openSUSE | 7.3 | ppc | wuftpd | < 2.6.0-328 | wuftpd-2.6.0-328.ppc.rpm |
openSUSE | 7.3 | i386 | wuftpd | < 2.6.0-403 | wuftpd-2.6.0-403.i386.rpm |
openSUSE | 7.3 | sparc | wuftpd | < 2.6.0-260 | wuftpd-2.6.0-260.sparc.rpm |
openSUSE | 7.2 | i386 | wuftpd | < 2.6.0-403 | wuftpd-2.6.0-403.i386.rpm |