Описание
Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator.
Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2003-1327
- https://exchange.xforce.ibmcloud.com/vulnerabilities/13269
- http://archives.neohapsis.com/archives/bugtraq/2003-09/0348.html
- http://secunia.com/advisories/9835
- http://securitytracker.com/id?1007775
- http://www.osvdb.org/2594
- http://www.securityfocus.com/bid/8668
- http://www.slackware.org/security/viewer.php?l=slackware-security&y=2003&m=slackware-security.365971
EPSS
CVE ID
Связанные уязвимости
Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator.
Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlie ...
EPSS