WU-FTPD Debug Mode Client Hostname Remote Format String

high Nessus Plugin ID 11331

Synopsis

The remote FTP server has a format string vulnerability.

Description

The remote WU-FTPd server, according to its version number, is vulnerable to a format string attack when running in debug mode.

Solution

Upgrade to WU-FTPD version 2.6.2 or later.

See Also

http://www.nessus.org/u?859aecba

Plugin Details

Severity: High

ID: 11331

File Name: wu_ftpd_pasv_format_string.nasl

Version: 1.24

Type: remote

Family: FTP

Published: 3/9/2003

Updated: 8/7/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: Settings/ParanoidReport, ftp/wuftpd

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 1/23/2001

Reference Information

CVE: CVE-2001-0187

BID: 2296

CERT: 639760