First published: Mon Dec 20 1999(Updated: )
wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AnonFTP | =2.8.1 | |
wu-ftpd | =2.4.2 | |
wu-ftpd | =2.5.0 | |
wu-ftpd | =2.6.0 | |
Red Hat Linux | =5.2 | |
Red Hat Linux | =6.0 | |
Red Hat Linux | =6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0997 is considered a critical vulnerability due to the potential for remote command execution by attackers.
To fix CVE-1999-0997, upgrade to the latest patched version of the affected FTP software that resolves this vulnerability.
CVE-1999-0997 affects specific versions of wu-ftp and anonftp as well as Red Hat Linux 5.2, 6.0, and 6.1.
The potential impacts of CVE-1999-0997 include unauthorized command execution, which can lead to data loss or system compromise.
Yes, CVE-1999-0997 can be exploited remotely by attackers with the ability to send malformed file names to the FTP service.