First published: Mon Mar 15 2004(Updated: )
Buffer overflow in the skey_challenge function in ftpd.c for wu-ftp daemon (wu-ftpd) 2.6.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a s/key (SKEY) request with a long name.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
wu-ftpd | =2.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0185 has a high severity due to its potential to allow remote attackers to execute arbitrary code and cause denial of service.
To fix CVE-2004-0185, upgrade to a patched version of wu-ftpd or disable the affected service.
CVE-2004-0185 affects wu-ftpd version 2.6.2.
CVE-2004-0185 enables a buffer overflow attack through a long s/key request, which can lead to remote code execution.
Yes, CVE-2004-0185 can cause a denial of service condition due to the buffer overflow vulnerability.