Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-63rh-cqhw-45cw

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator.

Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator.

EPSS

Процентиль: 79%
0.01277
Низкий

Связанные уязвимости

ubuntu
больше 21 года назад

Описание отсутствует

nvd
больше 21 года назад

Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator.

debian
больше 21 года назад

Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlie ...

EPSS

Процентиль: 79%
0.01277
Низкий