First published: Tue Feb 09 1999(Updated: )
Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ProFTPD | =1.2_pre1 | |
wu-ftpd | =2.4.2_beta18 | |
wu-ftpd | =2.4.2_beta18_vr9 | |
SCO OpenLinux Server | =1.3 | |
Debian GNU/Linux | =2.0 | |
Red Hat Linux | =5.0 | |
Red Hat Linux | =5.1 | |
Xinuos OpenServer | =5.0 | |
Xinuos OpenServer | =5.0.2 | |
Xinuos OpenServer | =5.0.3 | |
Xinuos OpenServer | =5.0.4 | |
Xinuos OpenServer | =5.0.5 | |
Xinuos UnixWare | =7.0 | |
Xinuos UnixWare | =7.0.1 | |
Slackware Linux | =3.4 | |
Slackware Linux | =3.5 | |
Slackware Linux | =3.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0368 has been classified as a critical vulnerability due to its potential to provide remote root access.
To remediate CVE-1999-0368, upgrade to the latest stable versions of wu-ftpd and ProFTPD that address this buffer overflow vulnerability.
CVE-1999-0368 affects specific versions of wu-ftpd 2.4.2 beta and ProFTPD 1.2 pre1, among others.
The impact of CVE-1999-0368 includes the risk of unauthorized remote root access, which can lead to system compromise.
While CVE-1999-0368 is an older vulnerability, it remains relevant for legacy systems still running the affected software versions.