Vulnerability Name:

CVE-1999-0368 (CCN-1728)

Assigned:1999-02-09
Published:1999-02-09
Updated:2022-08-17
Summary:Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-1999-004.0
Buffer overflow in wu-ftpd

Source: MITRE
Type: CNA
CVE-1999-0368

Source: CCN
Type: BindView RAZOR Security Advisory, February 9, 1999
Palmetto Technical Advisory

Source: CCN
Type: CERT Advisory CA-1999-03
Remote buffer overflows in various FTP servers leads to potential root compromise

Source: CCN
Type: CIAC Information Bulletin J-029
Buffer Overflows in Various FTP Servers

Source: DEBIAN
Type: Debian Security Advisory 19990210
Debian FTP packages: Buffer overflow in some ftp servers

Source: CCN
Type: OSVDB ID: 248
WU-FTPD MKDIR Directory Creation / Change Remote Overflow

Source: CCN
Type: OSVDB ID: 9163
ProFTPD MKDIR Directory Creation / Change Remote Overflow (palmetto)

Source: CCN
Type: Red Hat, Inc. Linux 5.2 (Apollo) General Errata
wu-ftpd: Security Fix

Source: CCN
Type: BID-113
Multiple Vendor FTPD realpath Vulnerability

Source: CCN
Type: BID-2242
Multiple Vendor FTP Long Path Buffer Overflow Vulnerability

Source: XF
Type: UNKNOWN
palmetto-ftpd-bo(1728)

Source: MISC
Type: UNKNOWN
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0368

Vulnerable Configuration:Configuration 1:
  • cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr9:*:*:*:*:*:*:*
  • OR cpe:/a:proftpd_project:proftpd:1.2_pre1:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:sco:openserver:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:3.5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:sco:openserver:5.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:sco:openserver:5.0.5:*:*:*:*:*:*:*
  • OR cpe:/o:slackware:slackware_linux:3.6:*:*:*:*:*:*:*
  • OR cpe:/o:sco:unixware:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:sco:openserver:5.0.3:*:*:*:*:*:*:*
  • OR cpe:/o:sco:unixware:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:sco:openserver:5.0.4:*:*:*:*:*:*:*
  • OR cpe:/o:caldera:openlinux:1.3:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:proftpd:proftpd:*:*:*:*:*:*:*:*
  • AND
  • cpe:/o:ibm:aix:*:*:*:*:*:*:*:*
  • OR cpe:/o:windriver:bsdos:*:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:*:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:*:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:*:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:os2:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_95:*:*:*:*:*:*:*:*
  • OR cpe:/a:data_general:dg_ux:*:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:*:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_98:*:*:*:*:*:*:*:*
  • OR cpe:/o:sco:unix:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_98se:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_me:*:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:xp:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    washington_university wu-ftpd 2.4.2_beta18_vr9
    proftpd_project proftpd 1.2_pre1
    washington_university wu-ftpd 2.4.2_beta18
    sco openserver 5.0
    slackware slackware linux 3.5
    redhat linux 5.1
    slackware slackware linux 3.4
    redhat linux 5.0
    sco openserver 5.0.2
    sco openserver 5.0.5
    slackware slackware linux 3.6
    sco unixware 7.0
    debian debian linux 2.0
    sco openserver 5.0.3
    sco unixware 7.0.1
    sco openserver 5.0.4
    caldera openlinux 1.3
    proftpd proftpd *
    ibm aix *
    windriver bsdos *
    hp hp-ux *
    sgi irix *
    linux linux kernel *
    sun solaris *
    ibm os2 *
    microsoft windows 95 *
    data_general dg ux *
    freebsd freebsd *
    washington_university wu-ftpd *
    microsoft windows nt 4.0
    microsoft windows 98 *
    sco unix *
    microsoft windows 98se *
    microsoft windows 2000 *
    openbsd openbsd *
    microsoft windows me *
    compaq tru64 *
    microsoft windows xp
    apple mac os *
    microsoft windows 2003_server