Vulnerability Name:

CVE-2000-0574 (CCN-4908)

Assigned:2000-07-03
Published:2000-07-03
Updated:2008-09-10
Summary:FTP servers such as OpenBSD ftpd, NetBSD ftpd, ProFTPd and Opieftpd do not properly cleanse untrusted format strings that are used in the setproctitle function (sometimes called by set_proc_title), which allows remote attackers to cause a denial of service or execute arbitrary commands.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-00:35
proftpd port contains remote root compromise

Source: CCN
Type: NetBSD Security Advisory 2000-009
ftpd setproctitle vulnerability

Source: NETBSD
Type: UNKNOWN
NetBSD-SA2000-009

Source: CCN
Type: OpenBSD release errata & patch list
019: SECURITY FIX: July 5, 2000

Source: CCN
Type: WU-FTPD Development Group
Current Version Download

Source: BUGTRAQ
Type: UNKNOWN
20000705 proftp advisory

Source: CCN
Type: BugTraq Mailing List, Wed Jul 05 2000 - 16:47:16 CDT
proftp advisory

Source: BUGTRAQ
Type: UNKNOWN
20000706 ftpd and setproctitle()

Source: CCN
Type: BugTraq Mailing List, Thu Jul 06 2000 - 04:05:44 CDT
ftpd and setproctitle()

Source: BUGTRAQ
Type: UNKNOWN
20000710 opieftpd setproctitle() patches

Source: MITRE
Type: CNA
CVE-2000-0574

Source: CCN
Type: Hewlett-Packard Company Security Bulletin HPSBUX0007-117
Sec. Vulnerability in ftpd **Rev.04**

Source: CCN
Type: CERT Advisory CA-2000-13
Two Input Validation Problems In FTPD

Source: CERT
Type: Patch, Third Party Advisory, US Government Resource
CA-2000-13

Source: CCN
Type: CERT Incident Note IN-2000-10
Widespread Exploitation of rpc.statd and wu-ftpd Vulnerabilities

Source: CCN
Type: CIAC Information Bulletin L-006
HP-UX lpspooler and ftpd Vulnerabilities

Source: CCN
Type: OSVDB ID: 7541
Multiple FTP Server setproctitle Function Arbitrary Command Execution

Source: CCN
Type: The Professional FTP Daemon Project
Latest Version Download

Source: BID
Type: UNKNOWN
1425

Source: CCN
Type: BID-1425
Multiple Vendor ftpd setproctitle() Format String Vulnerability

Source: BID
Type: UNKNOWN
1438

Source: CCN
Type: SuSE Security Announcement #57
nkitb < 2000.7.11-0

Source: XF
Type: UNKNOWN
ftp-setproctitle-format-string(4908)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:openbsd:ftpd:5.51:*:*:*:*:*:*:*
  • OR cpe:/a:openbsd:ftpd:5.60:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta1:*:academ:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18:*:academ:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr4:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr5:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr6:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr7:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr8:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr9:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr10:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr11:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr12:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr13:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr14:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr15:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_vr16:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_vr17:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.5:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.6:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:washington_university:wu-ftpd:2.5:*:*:*:*:*:*:*
  • OR cpe:/a:openbsd:ftpd:5.51:*:*:*:*:*:*:*
  • OR cpe:/a:openbsd:ftpd:5.60:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:ports_collection:*:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18:*:academ:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_vr17:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_vr16:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr9:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr8:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr7:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr6:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr5:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr4:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr15:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr14:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr13:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr12:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr11:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta18_vr10:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.4.2_beta1:*:academ:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    openbsd ftpd 5.51
    openbsd ftpd 5.60
    washington_university wu-ftpd 2.4.2_beta1
    washington_university wu-ftpd 2.4.2_beta18
    washington_university wu-ftpd 2.4.2_beta18_vr4
    washington_university wu-ftpd 2.4.2_beta18_vr5
    washington_university wu-ftpd 2.4.2_beta18_vr6
    washington_university wu-ftpd 2.4.2_beta18_vr7
    washington_university wu-ftpd 2.4.2_beta18_vr8
    washington_university wu-ftpd 2.4.2_beta18_vr9
    washington_university wu-ftpd 2.4.2_beta18_vr10
    washington_university wu-ftpd 2.4.2_beta18_vr11
    washington_university wu-ftpd 2.4.2_beta18_vr12
    washington_university wu-ftpd 2.4.2_beta18_vr13
    washington_university wu-ftpd 2.4.2_beta18_vr14
    washington_university wu-ftpd 2.4.2_beta18_vr15
    washington_university wu-ftpd 2.4.2_vr16
    washington_university wu-ftpd 2.4.2_vr17
    washington_university wu-ftpd 2.5
    washington_university wu-ftpd 2.6
    washington_university wu-ftpd 2.5
    openbsd ftpd 5.51
    openbsd ftpd 5.60
    freebsd ports collection *
    washington_university wu-ftpd 2.6.0
    washington_university wu-ftpd 2.4.2_beta18
    washington_university wu-ftpd 2.4.2_vr17
    washington_university wu-ftpd 2.4.2_vr16
    washington_university wu-ftpd 2.4.2_beta18_vr9
    washington_university wu-ftpd 2.4.2_beta18_vr8
    washington_university wu-ftpd 2.4.2_beta18_vr7
    washington_university wu-ftpd 2.4.2_beta18_vr6
    washington_university wu-ftpd 2.4.2_beta18_vr5
    washington_university wu-ftpd 2.4.2_beta18_vr4
    washington_university wu-ftpd 2.4.2_beta18_vr15
    washington_university wu-ftpd 2.4.2_beta18_vr14
    washington_university wu-ftpd 2.4.2_beta18_vr13
    washington_university wu-ftpd 2.4.2_beta18_vr12
    washington_university wu-ftpd 2.4.2_beta18_vr11
    washington_university wu-ftpd 2.4.2_beta18_vr10
    washington_university wu-ftpd 2.4.2_beta1