Wu-Ftpd SockPrintf() Remote...

- AV AC AU C I A
发布: 2003-09-22
修订: 2025-04-13

A remote stack-based buffer overrun has been reported for Wu-Ftpd. The problem occurs due to insufficient bounds checking when handling input within the SockPrintf() function. As a result, a remote attacker capable of creating a file path of excessive length, could potentially trigger the overrun. Successful exploitation of this vulnerability would ultimately allow for the execution of arbitrary code with the privileges of the Wu-Ftpd server, typically root. It should be noted that this vulnerability is not present within the default installation of Wu-Ftpd. The server must be configured using the 'MAIL_ADMIN' option to notify an administrator when a file has been uploaded.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息