First published: Mon Mar 26 2001(Updated: )
Format string vulnerability in wu-ftp 2.6.1 and earlier, when running with debug mode enabled, allows remote attackers to execute arbitrary commands via a malformed argument that is recorded in a PASV port assignment.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Washington University Wu-ftpd | =2.4.2_beta18 | |
Washington University Wu-ftpd | =2.4.2_beta18_vr14 | |
Washington University Wu-ftpd | =2.4.2_vr17 | |
Washington University Wu-ftpd | =2.4.2_beta18_vr9 | |
Washington University Wu-ftpd | =2.5 | |
Washington University Wu-ftpd | =2.4.1 | |
Washington University Wu-ftpd | =2.4.2_vr16 | |
Washington University Wu-ftpd | =2.4.2_beta18_vr11 | |
Washington University Wu-ftpd | =2.4.2_beta18_vr6 | |
Washington University Wu-ftpd | =2.4.2_beta18_vr4 | |
Washington University Wu-ftpd | =2.6 | |
Washington University Wu-ftpd | =2.4.2_beta18_vr12 | |
Washington University Wu-ftpd | =2.4.2_beta18_vr5 | |
Washington University Wu-ftpd | =2.4.2_beta18_vr13 | |
Washington University Wu-ftpd | =2.4.2_beta18_vr10 | |
Washington University Wu-ftpd | =2.4.2_beta9 | |
Washington University Wu-ftpd | =2.4.2_beta18_vr15 | |
Washington University Wu-ftpd | =2.4.2_beta18_vr7 | |
Washington University Wu-ftpd | =2.4.2_beta18_vr8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.