CVE-2003-0466

Scores

EPSS

0.908high90.8%
0%20%40%60%80%100%

Percentile: 90.8%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Description

Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow attackers to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buffer overflow, including (1) STOR, (2) RETR, (3) APPE, (4) DELE, (5) MKD, (6) RMD, (7) STOU, or (8) RNTO.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvd

CWEs

CWE-193

Related Vulnerabilities

Exploits

Exploit ID: 22974

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22974

Exploit ID: 22975

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22975

Exploit ID: 22976

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22976

Exploit ID: 74

Source: exploitdb

URL: https://www.exploit-db.com/exploits/74

Exploit ID: 78

Source: exploitdb

URL: https://www.exploit-db.com/exploits/78

Vulnerable Software (9)

Type: Configuration

Product: wu-ftpd

Operating System: debian

Trait:
{  "fixed": "2.6.2-12"}

Source: debian

Type: Configuration

Vendor: *

Product: freebsd

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:...

Source: nvd

Type: Configuration

Vendor: *

Product: mac_os_x

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:...

Source: nvd

Type: Configuration

Vendor: *

Product: mac_os_x_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:...

Source: nvd

Type: Configuration

Vendor: *

Product: netbsd

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:...

Source: nvd

Type: Configuration

Vendor: *

Product: openbsd

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:...

Source: nvd

Type: Configuration

Vendor: *

Product: solaris

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:...

Source: nvd

Type: Configuration

Vendor: *

Product: wu-ftpd

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:redhat:wu_ftpd:2.6.1-16:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:wuftpd:wu-ftpd:*:*:*:*:*:*:*:*",      ...

Source: nvd

Type: Configuration

Vendor: *

Product: wu_ftpd

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:redhat:wu_ftpd:2.6.1-16:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:wuftpd:wu-ftpd:*:*:*:*:*:*:*:*",      ...

Source: nvd

End of list