CVE-2003-0466

Current Description

Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow attackers to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buffer overflow, including (1) STOR, (2) RETR, (3) APPE, (4) DELE, (5) MKD, (6) RMD, (7) STOU, or (8) RNTO.

Basic Data

PublishedAugust 27, 2003
Last ModifiedMay 03, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score10.0
SeverityHIGH
Exploitability Score10.0
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRedhatWu Ftpd2.6.1-16*i386*****
    2.3ApplicationRedhatWu Ftpd2.6.1-16*powerpc*****
    2.3ApplicationRedhatWu Ftpd2.6.1-18*i386*****
    2.3ApplicationRedhatWu Ftpd2.6.1-18*ia64*****
    2.3ApplicationRedhatWu Ftpd2.6.2-5*i386*****
    2.3ApplicationRedhatWu Ftpd2.6.2-8*i386*****
    2.3ApplicationWashington UniversityWu-ftpd2.5.0*******
    2.3ApplicationWashington UniversityWu-ftpd2.6.0*******
    2.3ApplicationWashington UniversityWu-ftpd2.6.1*******
    2.3ApplicationWashington UniversityWu-ftpd2.6.2*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSAppleMac Os X10.2.6*******
    2.3OSAppleMac Os X Server10.2.6*******
    2.3OSFreebsdFreebsd4.0*******
    2.3OSFreebsdFreebsd4.0alpha******
    2.3OSFreebsdFreebsd4.1*******
    2.3OSFreebsdFreebsd4.1.1*******
    2.3OSFreebsdFreebsd4.1.1release******
    2.3OSFreebsdFreebsd4.1.1stable******
    2.3OSFreebsdFreebsd4.2*******
    2.3OSFreebsdFreebsd4.2stable******
    2.3OSFreebsdFreebsd4.3*******
    2.3OSFreebsdFreebsd4.3release******
    2.3OSFreebsdFreebsd4.3releng******
    2.3OSFreebsdFreebsd4.3stable******
    2.3OSFreebsdFreebsd4.4*******
    2.3OSFreebsdFreebsd4.4releng******
    2.3OSFreebsdFreebsd4.4stable******
    2.3OSFreebsdFreebsd4.5*******
    2.3OSFreebsdFreebsd4.5release******
    2.3OSFreebsdFreebsd4.5stable******
    2.3OSFreebsdFreebsd4.6*******
    2.3OSFreebsdFreebsd4.6release******
    2.3OSFreebsdFreebsd4.6stable******
    2.3OSFreebsdFreebsd4.6.2*******
    2.3OSFreebsdFreebsd4.7*******
    2.3OSFreebsdFreebsd4.7release******
    2.3OSFreebsdFreebsd4.7stable******
    2.3OSFreebsdFreebsd4.8*******
    2.3OSFreebsdFreebsd4.8pre-release******
    2.3OSFreebsdFreebsd5.0*******
    2.3OSFreebsdFreebsd5.0alpha******
    2.3OSNetbsdNetbsd1.5*******
    2.3OSNetbsdNetbsd1.5.1*******
    2.3OSNetbsdNetbsd1.5.2*******
    2.3OSNetbsdNetbsd1.5.3*******
    2.3OSNetbsdNetbsd1.6*******
    2.3OSNetbsdNetbsd1.6.1*******
    2.3OSOpenbsdOpenbsd2.0*******
    2.3OSOpenbsdOpenbsd2.1*******
    2.3OSOpenbsdOpenbsd2.2*******
    2.3OSOpenbsdOpenbsd2.3*******
    2.3OSOpenbsdOpenbsd2.4*******
    2.3OSOpenbsdOpenbsd2.5*******
    2.3OSOpenbsdOpenbsd2.6*******
    2.3OSOpenbsdOpenbsd2.7*******
    2.3OSOpenbsdOpenbsd2.8*******
    2.3OSOpenbsdOpenbsd2.9*******
    2.3OSOpenbsdOpenbsd3.0*******
    2.3OSOpenbsdOpenbsd3.1*******
    2.3OSOpenbsdOpenbsd3.2*******
    2.3OSOpenbsdOpenbsd3.3*******
    2.3OSSunSolaris9.0*sparc*****
    2.3OSSunSolaris9.0*x86*****

Vulnerable Software List

VendorProductVersions
Apple Mac Os X Server 10.2.6
Apple Mac Os X 10.2.6
Freebsd Freebsd 4.0, 4.1, 4.1.1, 4.2, 4.3, 4.4, 4.5, 4.6, 4.6.2, 4.7, 4.8, 5.0
Openbsd Openbsd 2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 2.9, 3.0, 3.1, 3.2, 3.3
Redhat Wu Ftpd 2.6.1-16, 2.6.1-18, 2.6.2-5, 2.6.2-8
Netbsd Netbsd 1.5, 1.5.1, 1.5.2, 1.5.3, 1.6, 1.6.1
Washington University Wu-ftpd 2.5.0, 2.6.0, 2.6.1, 2.6.2
Sun Solaris 9.0

References

NameSourceURLTags
NetBSD-SA2003-011.txt.ascftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-011.txt.ascNETBSD
20030731 wu-ftpd fb_realpath() off-by-one bughttp://archives.neohapsis.com/archives/vulnwatch/2003-q3/0065.htmlVULNWATCHExploit Vendor Advisory
IMNX-2003-7+-019-01http://download.immunix.org/ImmunixOS/7+/Updates/errata/IMNX-2003-7+-019-01IMMUNIX
http://isec.pl/vulnerabilities/isec-0011-wu-ftpd.txthttp://isec.pl/vulnerabilities/isec-0011-wu-ftpd.txtMISC
20030731 wu-ftpd fb_realpath() off-by-one bughttp://marc.info/?l=bugtraq&m=105967301604815&w=2BUGTRAQ
FreeBSD-SA-03:08http://marc.info/?l=bugtraq&m=106001410028809&w=2FREEBSD
20030804 wu-ftpd-2.6.2 off-by-one remote exploit.http://marc.info/?l=bugtraq&m=106001702232325&w=2BUGTRAQ
20030804 Off-by-one Buffer Overflow Vulnerability in BSD libc realpath(3)http://marc.info/?l=bugtraq&m=106002488209129&w=2BUGTRAQ
9423http://secunia.com/advisories/9423SECUNIA
9446http://secunia.com/advisories/9446SECUNIA
9447http://secunia.com/advisories/9447SECUNIA
9535http://secunia.com/advisories/9535SECUNIA
1007380http://securitytracker.com/id?1007380SECTRACK
1001257http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001257.1-1SUNALERT
DSA-357http://www.debian.org/security/2003/dsa-357DEBIAN
VU#743092http://www.kb.cert.org/vuls/id/743092CERT-VNThird Party Advisory US Government Resource
MDKSA-2003:080http://www.mandriva.com/security/advisories?name=MDKSA-2003:080MANDRAKE
SuSE-SA:2003:032http://www.novell.com/linux/security/advisories/2003_032_wuftpd.htmlSUSE
6602http://www.osvdb.org/6602OSVDB
RHSA-2003:245http://www.redhat.com/support/errata/RHSA-2003-245.htmlREDHAT
RHSA-2003:246http://www.redhat.com/support/errata/RHSA-2003-246.htmlREDHAT
20060213 Latest wu-ftpd exploit :-shttp://www.securityfocus.com/archive/1/424852/100/0/threadedBUGTRAQ
20060214 Re: Latest wu-ftpd exploit :-shttp://www.securityfocus.com/archive/1/425061/100/0/threadedBUGTRAQ
8315http://www.securityfocus.com/bid/8315BIDExploit Patch Vendor Advisory
TLSA-2003-46http://www.turbolinux.com/security/TLSA-2003-46.txtTURBO
libc-realpath-offbyone-bo(12785)https://exchange.xforce.ibmcloud.com/vulnerabilities/12785XF
oval:org.mitre.oval:def:1970https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1970OVAL