RHEL 2.1 : wu-ftpd (RHSA-2003:246)

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing a security update.

Description :

Updated wu-ftpd packages are available that fix an off-by-one buffer
overflow.

The wu-ftpd package contains the Washington University FTP (File
Transfer Protocol) server daemon. FTP is a method of transferring
files between machines.

An off-by-one bug has been discovered in versions of wu-ftpd up to and
including 2.6.2. On a vulnerable system, a remote attacker would be
able to exploit this bug to gain root privileges.

Red Hat Enterprise Linux contains a version of wu-ftpd that is
affected by this bug, although it is believed that this issue will not
be remotely exploitable due to compiler padding of the buffer that is
the target of the overflow. However, Red Hat still advises that all
users of wu-ftpd upgrade to these erratum packages, which contain a
security patch.

Red Hat would like to thank Wojciech Purczynski and Janusz
Niewiadomski of ISEC Security Research for their responsible
disclosure of this issue.

See also :

https://www.redhat.com/security/data/cve/CVE-2003-0466.html
http://isec.pl/vulnerabilities/isec-0011-wu-ftpd.txt
http://rhn.redhat.com/errata/RHSA-2003-246.html

Solution :

Update the affected wu-ftpd package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12413 ()

Bugtraq ID:

CVE ID: CVE-2003-0466