How to Buy
This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
Updated wu-ftpd packages are available that fix an off-by-one buffer
The wu-ftpd package contains the Washington University FTP (File
Transfer Protocol) server daemon. FTP is a method of transferring
files between machines.
An off-by-one bug has been discovered in versions of wu-ftpd up to and
including 2.6.2. On a vulnerable system, a remote attacker would be
able to exploit this bug to gain root privileges.
Red Hat Enterprise Linux contains a version of wu-ftpd that is
affected by this bug, although it is believed that this issue will not
be remotely exploitable due to compiler padding of the buffer that is
the target of the overflow. However, Red Hat still advises that all
users of wu-ftpd upgrade to these erratum packages, which contain a
Red Hat would like to thank Wojciech Purczynski and Janusz
Niewiadomski of ISEC Security Research for their responsible
disclosure of this issue.
See also :
Update the affected wu-ftpd package.
Risk factor :
Critical / CVSS Base Score : 10.0
Public Exploit Available : true
Family: Red Hat Local Security Checks
Nessus Plugin ID: 12413 ()
CVE ID: CVE-2003-0466
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.