WFTPD Pro Server 3.21 Release 1, with the XeroxDocutech option enabled, allows local users to cause a denial of service (crash) via a (1) MKD or (2) XMKD command that causes an absolute path of 260 characters to be used, which overwrites a cookie with a null character, possibly due to an off-by-one error.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=107801142924976&w=2 | Mailing List |
http://secunia.com/advisories/11001 | Broken Link |
http://www.osvdb.org/4116 | Broken Link |
http://www.securityfocus.com/bid/9767 | Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15342 | Third Party Advisory VDB Entry |
http://marc.info/?l=bugtraq&m=107801142924976&w=2 | Mailing List |
http://secunia.com/advisories/11001 | Broken Link |
http://www.osvdb.org/4116 | Broken Link |
http://www.securityfocus.com/bid/9767 | Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15342 | Third Party Advisory VDB Entry |
Configurations
History
20 Nov 2024, 23:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=107801142924976&w=2 - Mailing List | |
References | () http://secunia.com/advisories/11001 - Broken Link | |
References | () http://www.osvdb.org/4116 - Broken Link | |
References | () http://www.securityfocus.com/bid/9767 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/15342 - Third Party Advisory, VDB Entry |
16 Feb 2024, 20:44
Type | Values Removed | Values Added |
---|---|---|
First Time |
Wftpd Pro Server Project wftpd Pro Server
Wftpd Pro Server Project |
|
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/15342 - Third Party Advisory, VDB Entry | |
References | (OSVDB) http://www.osvdb.org/4116 - Broken Link | |
References | (BUGTRAQ) http://marc.info/?l=bugtraq&m=107801142924976&w=2 - Mailing List | |
References | (BID) http://www.securityfocus.com/bid/9767 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/11001 - Broken Link | |
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.5 |
CPE | cpe:2.3:a:texas_imperial_software:wftpd:3.0_0r5:*:pro:*:*:*:*:* cpe:2.3:a:texas_imperial_software:wftpd:3.0_0r4:*:*:*:*:*:*:* cpe:2.3:a:texas_imperial_software:wftpd:3.21:*:*:*:*:*:*:* cpe:2.3:a:texas_imperial_software:wftpd:3.10_r1:*:*:*:*:*:*:* cpe:2.3:a:texas_imperial_software:wftpd:3.0:*:pro:*:*:*:*:* cpe:2.3:a:texas_imperial_software:wftpd:3.0_0r4:*:pro:*:*:*:*:* cpe:2.3:a:texas_imperial_software:wftpd:3.0_0r5:*:*:*:*:*:*:* cpe:2.3:a:texas_imperial_software:wftpd:pro_3.21:*:*:*:*:*:*:* cpe:2.3:a:texas_imperial_software:wftpd:3.0_0r3:*:*:*:*:*:*:* cpe:2.3:a:texas_imperial_software:wftpd:3.0:*:*:*:*:*:*:* cpe:2.3:a:texas_imperial_software:wftpd:pro_3.20:*:*:*:*:*:*:* cpe:2.3:a:texas_imperial_software:wftpd:3.20:*:*:*:*:*:*:* |
cpe:2.3:a:wftpd_pro_server_project:wftpd_pro_server:3.21:r1:*:*:*:*:*:* |
CWE | CWE-193 |
Information
Published : 2004-11-23 05:00
Updated : 2024-11-20 23:48
NVD link : CVE-2004-0342
Mitre link : CVE-2004-0342
CVE.ORG link : CVE-2004-0342
JSON object : View
Products Affected
wftpd_pro_server_project
- wftpd_pro_server
CWE
CWE-193
Off-by-one Error