CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
99.7%
The lreply function in wu-ftpd 2.6.0 and earlier does not properly cleanse an untrusted format string, which allows remote attackers to execute arbitrary commands via the SITE EXEC command.
ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-2000.02
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:29.wu-ftpd.asc.v1.1
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2000-009.txt.asc
archives.neohapsis.com/archives/bugtraq/2000-06/0244.html
archives.neohapsis.com/archives/bugtraq/2000-07/0017.html
marc.info/?l=bugtraq&m=96171893218000&w=2
marc.info/?l=bugtraq&m=96179429114160&w=2
marc.info/?l=bugtraq&m=96299933720862&w=2
www.calderasystems.com/support/security/advisories/CSSA-2000-020.0.txt
www.cert.org/advisories/CA-2000-13.html
www.redhat.com/support/errata/RHSA-2000-039.html
www.securityfocus.com/bid/1387
www.securityfocus.com/templates/archive.pike?list=1&msg=20000623091822.3321.qmail%40fiver.freemessage.com
exchange.xforce.ibmcloud.com/vulnerabilities/4773