Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.10318
Categoría:FTP
Título:wu-ftpd buffer overflow
Resumen:NOSUMMARY
Descripción:Description:

It was possible to make the remote FTP server crash
by creating a huge directory structure.
This is usually called the 'wu-ftpd buffer overflow'
even though it affects other FTP servers.

It is very likely that an attacker can use this
flaw to execute arbitrary code on the remote
server. This will give him a shell on your system,
which is not a good thing.

Solution : upgrade your FTP server.
Consider removing directories writable by 'anonymous'.

Risk factor : High

Referencia Cruzada: BugTraq ID: 113
BugTraq ID: 2242
BugTraq ID: 599
BugTraq ID: 747
Common Vulnerability Exposure (CVE) ID: CVE-1999-0368
Cert/CC Advisory: CA-99.03
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0368
Netect Security Advisory: palmetto.ftpd
XForce ISS Database: palmetto-ftpd-bo
Common Vulnerability Exposure (CVE) ID: CVE-1999-0878
AUSCERT Advisory: AA-1999.01
http://www.securityfocus.com/bid/599
Cert/CC Advisory: CA-99-13
COMPAQ Service Security Patch: SSRT0622
RedHat Security Advisories: RHSA1999031_01
XForce ISS Database: wu-ftpd-dir-name
Common Vulnerability Exposure (CVE) ID: CVE-1999-0879
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0879
XForce ISS Database: wuftp-message-file-root
Common Vulnerability Exposure (CVE) ID: CVE-1999-0950
http://www.securityfocus.com/bid/747
Bugtraq: 19991027 WFTPD v2.40 FTPServer remotely exploitable buffer overflow vulnerability (Google Search)
XForce ISS Database: wftpd-mkd-bo
CopyrightThis script is Copyright (C) 1999 Renaud Deraison

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.