RHEL 2.1 : wu-ftpd (RHSA-2003:246)

This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing a security update.

Description :

Updated wu-ftpd packages are available that fix an off-by-one buffer

The wu-ftpd package contains the Washington University FTP (File
Transfer Protocol) server daemon. FTP is a method of transferring
files between machines.

An off-by-one bug has been discovered in versions of wu-ftpd up to and
including 2.6.2. On a vulnerable system, a remote attacker would be
able to exploit this bug to gain root privileges.

Red Hat Enterprise Linux contains a version of wu-ftpd that is
affected by this bug, although it is believed that this issue will not
be remotely exploitable due to compiler padding of the buffer that is
the target of the overflow. However, Red Hat still advises that all
users of wu-ftpd upgrade to these erratum packages, which contain a
security patch.

Red Hat would like to thank Wojciech Purczynski and Janusz
Niewiadomski of ISEC Security Research for their responsible
disclosure of this issue.

See also :


Solution :

Update the affected wu-ftpd package.

Risk factor :

Critical / CVSS Base Score : 10.0
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12413 ()

Bugtraq ID:

CVE ID: CVE-2003-0466

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now