ID CVE-2004-0185
Summary Buffer overflow in the skey_challenge function in ftpd.c for wu-ftp daemon (wu-ftpd) 2.6.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a s/key (SKEY) request with a long name.
References
Vulnerable Configurations
  • cpe:2.3:a:washington_university:wu-ftpd:2.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:washington_university:wu-ftpd:2.6.2:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 14-02-2024 - 01:17)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
redhat via4
advisories
rhsa
id RHSA-2004:096
refmap via4
bid 8893
confirm ftp://ftp.wu-ftpd.org/pub/wu-ftpd/patches/apply_to_2.6.2/skeychallenge.patch
debian DSA-457
misc
xf wuftpd-skey-bo(13518)
Last major update 14-02-2024 - 01:17
Published 15-03-2004 - 05:00
Last modified 14-02-2024 - 01:17
Back to Top