First published: Fri Nov 30 2001(Updated: )
wu-ftpd 2.6.1 allows remote attackers to execute arbitrary commands via a "~{" argument to commands such as CWD, which is not properly handled by the glob function (ftpglob).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
wu-ftpd | =2.5.0 | |
FTP Daemon (FTPD) for BSD | =0.3.2 | |
wu-ftpd | =2.6.0 | |
FTP Daemon (FTPD) for BSD | =0.3.3 | |
wu-ftpd | =2.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0550 is classified as a high-severity vulnerability due to its potential for remote code execution.
The best way to fix CVE-2001-0550 is to upgrade to a secure version of wu-ftpd or apply available patches that address this vulnerability.
CVE-2001-0550 affects wu-ftpd versions 2.6.1 and prior, including versions 2.6.0 and 2.5.0.
CVE-2001-0550 allows remote attackers to execute arbitrary commands on the server via specially crafted arguments.
CVE-2001-0550 primarily affects systems running implementations of wu-ftpd, which can vary across different Unix-like operating systems.