FreeBSD : wu-ftpd -- remote globbing DoS vulnerability (ef410571-a541-11d9-a788-0001020eed82)

Medium Nessus Plugin ID 19162


The remote FreeBSD host is missing one or more security-related updates.


An iDEFENSE Security Advisory reports :

Remote exploitation of an input validation vulnerability in version 2.6.2 of WU-FPTD could allow for a denial of service of the system by resource exhaustion.

The vulnerability specifically exists in the wu_fnmatch() function in wu_fnmatch.c. When a pattern containing a '*' character is supplied as input, the function calls itself recursively on a smaller substring.
By supplying a string which contains a large number of '*' characters, the system will take a long time to return the results, during which time it will be using a large amount of CPU time.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 19162

File Name: freebsd_pkg_ef410571a54111d9a7880001020eed82.nasl

Version: $Revision: 1.14 $

Type: local

Published: 2005/07/13

Modified: 2013/06/22

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:wu-ftpd, p-cpe:/a:freebsd:freebsd:wu-ftpd+ipv6, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2005/04/04

Vulnerability Publication Date: 2005/02/05

Reference Information

CVE: CVE-2005-0256

CWE: 119