Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2001-0187


Format string vulnerability in wu-ftp 2.6.1 and earlier, when running with debug mode enabled, allows remote attackers to execute arbitrary commands via a malformed argument that is recorded in a PASV port assignment.


Published

2001-03-26T05:00:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 10.0 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

10.0

Impact Score

10.0

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application washington_university wu-ftpd 2.4.1 Yes
Application washington_university wu-ftpd 2.4.2_beta9 Yes
Application washington_university wu-ftpd 2.4.2_beta18 Yes
Application washington_university wu-ftpd 2.4.2_beta18_vr4 Yes
Application washington_university wu-ftpd 2.4.2_beta18_vr5 Yes
Application washington_university wu-ftpd 2.4.2_beta18_vr6 Yes
Application washington_university wu-ftpd 2.4.2_beta18_vr7 Yes
Application washington_university wu-ftpd 2.4.2_beta18_vr8 Yes
Application washington_university wu-ftpd 2.4.2_beta18_vr9 Yes
Application washington_university wu-ftpd 2.4.2_beta18_vr10 Yes
Application washington_university wu-ftpd 2.4.2_beta18_vr11 Yes
Application washington_university wu-ftpd 2.4.2_beta18_vr12 Yes
Application washington_university wu-ftpd 2.4.2_beta18_vr13 Yes
Application washington_university wu-ftpd 2.4.2_beta18_vr14 Yes
Application washington_university wu-ftpd 2.4.2_beta18_vr15 Yes
Application washington_university wu-ftpd 2.4.2_vr16 Yes
Application washington_university wu-ftpd 2.4.2_vr17 Yes
Application washington_university wu-ftpd 2.5 Yes
Application washington_university wu-ftpd 2.6 Yes

References