Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> FTP >> wu-ftpd SITE EXEC vulnerability


Vulnerability Assessment Details

wu-ftpd SITE EXEC vulnerability

Vulnerability Assessment Summary
Checks if the remote FTP server sanitizes the SITE EXEC command

Detailed Explanation for this Vulnerability Assessment

The remote FTP server does not properly sanitize the argument of
the SITE EXEC command.
It may be possible for a remote attacker
to gain root access.

Solution : Upgrade your wu-ftpd server (<= 2.6.0 are vulnerable)
or disable any access from untrusted users (especially anonymous).

Network Security Threat Level: High

Networks Security ID: 726, 1387, 2240

Vulnerability Assessment Copyright: This script is Copyright (C) 2000 A. de Bernis

Cables, Connectors

Cisco ASA 5520 Series ASA5520-K8 V02 w/ SSM-10 Firewall Security Plus
$129.0
Cisco ASA 5520 Series ASA5520-K8 V02 w/ SSM-10 Firewall Security Plus pictureMcafee ATD-6000 ADV THREAT DEFENSE network security platform MSRP $138000
$29999.99
Mcafee ATD-6000 ADV THREAT DEFENSE network security platform MSRP $138000 pictureLot of 2 - Sonicwall Internet Security Firewalls - APL14-034 and APL11-029
$20.95
Lot of 2 - Sonicwall Internet Security Firewalls - APL14-034 and APL11-029 pictureZonet ZUC2400 3+1 Internal USB2.0 / 2+1 Internal Port Firewall Pci Combo Card
$10.0
Zonet ZUC2400 3+1 Internal USB2.0 / 2+1 Internal Port Firewall Pci Combo Card picture


Discussions

No Discussions have been posted on this vulnerability.