Vulnerability Name: | CVE-2001-0318 (CCN-6433) | ||||||||
Assigned: | 2001-01-10 | ||||||||
Published: | 2001-01-10 | ||||||||
Updated: | 2017-10-10 | ||||||||
Summary: | Format string vulnerability in ProFTPD 1.2.0rc2 may allow attackers to execute arbitrary commands by shutting down the FTP server while using a malformed working directory (cwd). | ||||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Wed Jan 10 2001 - 12:11:09 CST proftpd 1.2.0rc2 -- example of bad coding Source: BUGTRAQ Type: Patch, Vendor Advisory 20010206 Response to ProFTPD issues Source: CCN Type: BugTraq Mailing List, Tue Feb 06 2001 - 19:17:33 CST Response to ProFTPD issues Source: CCN Type: Conectiva Linux Announcement CLSA-2001:380 proftpd Source: CCN Type: BugTraq Mailing List, Tue Feb 13 2001 - 08:19:43 CST Trustix Security Advisory - proftpd, kernel Source: MITRE Type: CNA CVE-2001-0318 Source: CONECTIVA Type: UNKNOWN CLA-2001:380 Source: BUGTRAQ Type: UNKNOWN 20010110 proftpd 1.2.0rc2 -- example of bad coding Source: DEBIAN Type: Patch, Vendor Advisory DSA-029 Source: DEBIAN Type: DSA-029 proftpd -- remote DOS & potential buffer overflow Source: MANDRAKE Type: Patch, Vendor Advisory MDKSA-2001:021 Source: CCN Type: OSVDB ID: 5705 ProFTPD Malformed cwd Command Format String Source: CCN Type: ProFTPD Web site ProFTPD Source: CCN Type: BID-6781 ProFTPD 1.2.0rc2 log_pri() Format String Vulnerability Source: CCN Type: MandrakeSoft Security Advisory MDKSA-2001:021 proftpd Source: XF Type: UNKNOWN proftpd-format-string(6433) Source: XF Type: UNKNOWN proftpd-format-string(6433) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |