Last Modified: Aug. 17, 2022
Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via macro variables in a message file.
Access Vector: Network
Access Complexity: Low
Authentication: None
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete
Base Score: 10.0
Exploitability Score: 10.0
Impact Score: 10.0
CVSS V2: AV:N/AC:L/Au:N/C:C/I:C/A:C
NVD-CWE-Other
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:o:caldera:openlinux:1.0:*:*:*:*:*:*:* Part: o Vendor: caldera | Alle Schwachstellen für caldera | |
cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:* Part: o Vendor: bsdi | Alle Schwachstellen für bsdi | |
cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:* Part: o Vendor: bsdi | Alle Schwachstellen für bsdi |
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="operating_system" value="cpe:2.3:o:caldera:openlinux:1.0:*:*:*:*:*:*:*"/> <prop key="operating_system" value="cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*"/> <prop key="operating_system" value="cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> <prop key="range" value="remote"/> </set>
<?xml version="1.0" ?> <set operator="and"> <prop key="target" value="host"/> <set operator="or"> <prop key="program_influence" value="input"/> <prop key="program_influence" value="output"/> <prop key="program_influence" value="existence"/> </set> <prop key="data" value="any"/> <set operator="or"> <prop key="data_influence" value="read"/> <prop key="data_influence" value="write"/> <prop key="data_influence" value="delete"/> </set> <set operator="or"> <prop key="range" value="remote"/> <prop key="range" value="local"/> </set> </set>