Executive Summary

Summary
Title New wu-ftpd packages fix insecure program execution
Informations
Name DSA-377 First vendor Publication 2003-09-04
Vendor Debian Last vendor Modification 2003-09-04
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

wu-ftpd, an FTP server, implements a feature whereby multiple files can be fetched in the form of a dynamically constructed archive file, such as a tar archive. The names of the files to be included are passed as command line arguments to tar, without protection against them being interpreted as command-line options. GNU tar supports several command line options which can be abused, by means of this vulnerability, to execute arbitrary programs with the privileges of the wu-ftpd process.

Georgi Guninski pointed out that this vulnerability exists in Debian woody.

For the stable distribution (woody) this problem has been fixed in version 2.6.2-3woody2.

For the unstable distribution (sid) this problem will be fixed soon.

We recommend that you update your wu-ftpd package.

Original Source

Url : http://www.debian.org/security/2003/dsa-377

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 3
Os 3

OpenVAS Exploits

Date Description
2008-01-17 Name : Debian Security Advisory DSA 377-1 (wu-ftpd)
File : nvt/deb_377_1.nasl
2005-11-03 Name : wu-ftpd SITE EXEC vulnerability
File : nvt/wu_ftpd_site_exec.nasl
0000-00-00 Name : Slackware Advisory SSA:2003-259-03 WU-FTPD Security Advisory
File : nvt/esoft_slk_ssa_2003_259_03.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
1736 WU-FTPD FTP Conversion Malformed File Name Handling Arbitrary Command Execution

Snort® IPS/IDS

Date Description
2014-01-10 tar parameters
RuleID : 362-community - Revision : 20 - Type : PROTOCOL-FTP
2014-01-10 tar parameters
RuleID : 362 - Revision : 20 - Type : PROTOCOL-FTP
2014-01-10 format string attempt
RuleID : 1530 - Revision : 14 - Type : FTP

Nessus® Vulnerability Scanner

Date Description
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-377.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:32:52
  • Multiple Updates