Description
Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow attackers to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buffer overflow, including (1) STOR, (2) RETR, (3) APPE, (4) DELE, (5) MKD, (6) RMD, (7) STOU, or (8) RNTO.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Apple
Subscribe
Mac Os X
Subscribe
Mac Os X Server
Subscribe
Freebsd
Subscribe
Freebsd
Subscribe
Netbsd
Subscribe
Netbsd
Subscribe
Openbsd
Subscribe
Openbsd
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Linux
Subscribe
Wu Ftpd
Subscribe
Sun
Subscribe
Solaris
Subscribe
Wuftpd
Subscribe
Wu-ftpd
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T01:58:10.161Z
Reserved: 2003-06-26T00:00:00.000Z
Link: CVE-2003-0466
No data.
Status : Deferred
Published: 2003-08-27T04:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2003-0466
OpenCVE Enrichment
No data.
Weaknesses