Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-63rh-cqhw-45cw

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator.

Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator.

EPSS

Процентиль: 80%
0.01358
Низкий

Связанные уязвимости

ubuntu
около 22 лет назад

Описание отсутствует

nvd
около 22 лет назад

Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator.

debian
около 22 лет назад

Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlie ...

EPSS

Процентиль: 80%
0.01358
Низкий