Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2003-0466


Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow attackers to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buffer overflow, including (1) STOR, (2) RETR, (3) APPE, (4) DELE, (5) MKD, (6) RMD, (7) STOU, or (8) RNTO.


Published

2003-08-27T04:00:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

10.0

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-193

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application redhat wu_ftpd 2.6.1-16 Yes
Application wuftpd wu-ftpd ≤ 2.6.2 Yes
Operating System apple mac_os_x 10.2.6 Yes
Operating System apple mac_os_x_server 10.2.6 Yes
Operating System freebsd freebsd ≤ 5.0 Yes
Operating System netbsd netbsd ≤ 1.6.1 Yes
Operating System openbsd openbsd ≤ 3.3 Yes
Operating System sun solaris 9.0 Yes

References