Vulnerability Description
Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users to execute arbitrary code by uploading a file with a long pathname, which triggers the overflow when wu-ftpd constructs a notification message to the administrator.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | All versions |
| Washington University | Wu-Ftpd | <= 2.6.2 |
References
- http://archives.neohapsis.com/archives/bugtraq/2003-09/0348.html
- http://secunia.com/advisories/9835Vendor Advisory
- http://securitytracker.com/id?1007775
- http://www.osvdb.org/2594
- http://www.securityfocus.com/bid/8668
- http://www.slackware.org/security/viewer.php?l=slackware-security&y=2003&m=slack
- https://exchange.xforce.ibmcloud.com/vulnerabilities/13269
- http://archives.neohapsis.com/archives/bugtraq/2003-09/0348.html
- http://secunia.com/advisories/9835Vendor Advisory
- http://securitytracker.com/id?1007775
- http://www.osvdb.org/2594
- http://www.securityfocus.com/bid/8668
- http://www.slackware.org/security/viewer.php?l=slackware-security&y=2003&m=slack
- https://exchange.xforce.ibmcloud.com/vulnerabilities/13269
FAQ
What is CVE-2003-1327?
CVE-2003-1327 is a vulnerability with a CVSS score of 9.3 (HIGH). Buffer overflow in the SockPrintf function in wu-ftpd 2.6.2 and earlier, when compiled with MAIL_ADMIN option enabled on a system that supports very long pathnames, might allow remote anonymous users ...
How severe is CVE-2003-1327?
CVE-2003-1327 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-1327?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Washington University Wu-Ftpd.