Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2003-1327

Опубликовано: 31 дек. 2003
Источник: debian
EPSS Низкий

Описание

Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wu-ftpdfixed2.6.2-26package

Примечания

  • Linux' limit is 4096 chars

EPSS

Процентиль: 79%
0.01277
Низкий

Связанные уязвимости

ubuntu
больше 21 года назад

Описание отсутствует

nvd
больше 21 года назад

Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator.

github
около 3 лет назад

Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator.

EPSS

Процентиль: 79%
0.01277
Низкий