Vulnerability Name:

CVE-2001-0935 (CCN-7611)

Assigned:2001-11-27
Published:2001-11-27
Updated:2008-09-10
Summary:Vulnerability in wu-ftpd 2.6.0, and possibly earlier versions, which is unrelated to the ftpglob bug described in CVE-2001-0550.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-01:64
wu-ftpd port contains remote root compromise

Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2001-041.0
Linux - Vulnerability in wu-ftpd

Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2002-SCO.1
OpenServer: wu-ftpd ftpglob() vulnerability

Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2001-SCO.36.2
REVISED: Open UNIX, UnixWare 7: wu-ftpd ftpglob() vulnerability

Source: CCN
Type: BugTraq Mailing List, Wed Nov 28 2001 - 11:05:28 CST
*ALERT* BID 3581: Wu-Ftpd File Globbing Heap Corruption Vulnerability

Source: CCN
Type: SuSE Security Announcement SuSE-SA:2001:043
wuftpd

Source: CCN
Type: BugTraq Mailing List, Wed Nov 28 2001 - 17:59:45 CST
WU-FTPD 2.6.1 diff glob.c patch

Source: CCN
Type: Hewlett-Packard Company Security Bulletin HPSBUX0107-162
Security Vulnerability in ftpd and ftp

Source: MITRE
Type: CNA
CVE-2001-0550

Source: MITRE
Type: CNA
CVE-2001-0935

Source: CCN
Type: Conectiva Linux Announcement CLSA-2001:442
wu-ftpd

Source: CCN
Type: Immunix OS Security Advisory IMNX-2001-70-036-01
wu-ftpd

Source: CCN
Type: Vuln-Dev Mailing List, 2001-05-01 1:00:20
some ftpd implementations mishandle CWD ~{

Source: CCN
Type: RHSA-2001-157
Updated wu-ftpd packages are available

Source: CCN
Type: CERT Advisory CA-2001-33
Multiple Vulnerabilities in WU-FTPD

Source: CCN
Type: CIAC Information Bulletin M-023
Multiple Vendor wu-ftdp File Globbing Heap Corruption Vulnerability

Source: CCN
Type: CORE SECURITY TECHNOLOGIES CORE-20011001
WU-FTPD Improper Ftpglob Error Handling Vulnerability

Source: DEBIAN
Type: DSA-087
wu-ftpd -- remote root exploit

Source: CCN
Type: Internet Security Systems Security Alert #103
WU-FTPD Heap Corruption Vulnerability

Source: CCN
Type: US-CERT VU#886083
WU-FTPD does not properly handle file name globbing

Source: CCN
Type: National Infrastructure Protection Center Advisory 01-027
"Significant Vulnerability Identified In Common Linux File Transport Protocol Program"

Source: SUSE
Type: UNKNOWN
SuSE-SA:2001:043

Source: CCN
Type: OSVDB ID: 13998
WU-FTPD Unspecified Security Issue

Source: CCN
Type: OSVDB ID: 686
WU-FTPD ftpglob Function Error Handling Arbitrary Code Execution

Source: CCN
Type: BID-3581
Wu-Ftpd File Globbing Heap Corruption Vulnerability

Source: CCN
Type: WU-FTPD Web site
WU-FTPD Development Group

Source: XF
Type: UNKNOWN
wuftp-glob-heap-corruption(7611)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:washington_university:wu-ftpd:2.4:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.6.1:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:washington_university:wu-ftpd:2.5:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:washington_university:wu-ftpd:2.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:david_madore:ftpd-bsd:0.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:david_madore:ftpd-bsd:0.3.3:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:6.3:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:6.4:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:ports_collection:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:prg_graficos:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:ecommerce:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    washington_university wu-ftpd 2.4
    washington_university wu-ftpd 2.6.0
    washington_university wu-ftpd 2.6.1
    washington_university wu-ftpd 2.5
    washington_university wu-ftpd 2.6.0
    washington_university wu-ftpd 2.6.1
    david_madore ftpd-bsd 0.3.2
    david_madore ftpd-bsd 0.3.3
    redhat linux 6.2
    suse suse linux 6.3
    suse suse linux 6.4
    debian debian linux 2.2
    mandrakesoft mandrake linux 7.1
    freebsd ports collection *
    redhat linux 7
    mandrakesoft mandrake linux 7.2
    suse suse linux 7.0
    conectiva linux 6.0
    mandrakesoft mandrake linux corporate server 1.0.1
    suse suse linux 7.1
    redhat linux 7.1
    mandrakesoft mandrake linux 8.0
    conectiva linux 5.0
    conectiva linux prg_graficos
    conectiva linux ecommerce
    conectiva linux 5.1
    suse suse linux 7.2
    conectiva linux 7.0
    mandrakesoft mandrake linux 8.1
    redhat linux 7.2
    suse suse linux 7.3
    redhat linux 7.3