FreeBSD : wu-ftpd -- remote globbing DoS vulnerability (ef410571-a541-11d9-a788-0001020eed82)

medium Nessus Plugin ID 19162

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

An iDEFENSE Security Advisory reports :

Remote exploitation of an input validation vulnerability in version 2.6.2 of WU-FPTD could allow for a denial of service of the system by resource exhaustion.

The vulnerability specifically exists in the wu_fnmatch() function in wu_fnmatch.c. When a pattern containing a '*' character is supplied as input, the function calls itself recursively on a smaller substring.
By supplying a string which contains a large number of '*' characters, the system will take a long time to return the results, during which time it will be using a large amount of CPU time.

Solution

Update the affected packages.

See Also

https://marc.info/?l=bugtraq&m=110935886414939

http://www.nessus.org/u?1d8bf61c

Plugin Details

Severity: Medium

ID: 19162

File Name: freebsd_pkg_ef410571a54111d9a7880001020eed82.nasl

Version: 1.18

Type: local

Published: 7/13/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:wu-ftpd, p-cpe:/a:freebsd:freebsd:wu-ftpd%2bipv6, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 4/4/2005

Vulnerability Publication Date: 2/5/2005

Reference Information

CVE: CVE-2005-0256

CWE: 119