Executive Summary
Summary | |
---|---|
Title | New lukemftpd packages fix arbitrary code execution |
Informations | |||
---|---|---|---|
Name | DSA-551 | First vendor Publication | 2004-09-21 |
Vendor | Debian | Last vendor Modification | 2004-09-21 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 5.1 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Przemyslaw Frasunek discovered a vulnerability in tnftpd or lukemftpd respectively, the enhanced ftp daemon from NetBSD. An attacker could utilise this to execute arbitrary code on the server. For the stable distribution (woody) this problem has been fixed in version 1.1-1woody2. For the unstable distribution (sid) this problem has been fixed in version 1.1-2.2. We recommend that you upgrade your lukemftpd package. |
Original Source
Url : http://www.debian.org/security/2004/dsa-551 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 2 | |
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200409-19 (heimdal) File : nvt/glsa_200409_19.nasl |
2008-09-04 | Name : FreeBSD Ports: tnftpd File : nvt/freebsd_tnftpd.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 551-1 (lukemftpd) File : nvt/deb_551_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
9738 | Multiple ftpd ABOR Command Signal Handling Privilege Escalation Multiple ftpd contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered due to improper signal handler operations. By providing a ABOR command during an established FTP session, a remote attacker could gain access to unauthorized privileges, resulting in a loss of integrity. |
9737 | Multiple ftpd libc Function Calls Signal Handling Privilege Escalation Multiple ftpd contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered due to improper signal handler operations. By sending a SIGURG signal over a TCP stream (OOB message) during libc function calls, a remote attacker could gain access to unauthorized privileges, resulting in a loss of integrity. |
8994 | Heimdal ftpd Signal Handling Privilege Escalation Multiple ftpd contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered due to improper signal handler operations. By providing a USER command during an established FTP session, a remote attacker could gain access to unauthorized privileges, resulting in a loss of integrity. |
8993 | Multiple ftpd USER/PASS Signal Handling Privilege Escalation Multiple ftpd programs contain a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered due to improper signal handler operations. By providing the USER and PASS commands during an established FTP session, a remote attacker could gain access to unauthorized privileges, resulting in a loss of integrity. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-04-23 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_c4b025bbf05d11d89837000c41e2cdad.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-551.nasl - Type : ACT_GATHER_INFO |
2004-09-16 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200409-19.nasl - Type : ACT_GATHER_INFO |
2004-09-08 | Name : The remote host is missing a Mac OS X update that fixes a security issue. File : macosx_SecUpd20040907.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:33:27 |
|