Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator.
References
Configurations
Configuration 1 (hide)
AND |
|
History
20 Nov 2024, 23:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2003-09/0348.html - | |
References | () http://secunia.com/advisories/9835 - Vendor Advisory | |
References | () http://securitytracker.com/id?1007775 - | |
References | () http://www.osvdb.org/2594 - | |
References | () http://www.securityfocus.com/bid/8668 - | |
References | () http://www.slackware.org/security/viewer.php?l=slackware-security&y=2003&m=slackware-security.365971 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/13269 - |
Information
Published : 2003-12-31 05:00
Updated : 2024-11-20 23:46
NVD link : CVE-2003-1327
Mitre link : CVE-2003-1327
CVE.ORG link : CVE-2003-1327
JSON object : View
Products Affected
linux
- linux_kernel
washington_university
- wu-ftpd
CWE