Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2000-0573
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
The lreply function in wu-ftpd 2.6.0 and earlier does not properly cleanse an untrusted format string, which allows remote attackers to execute arbitrary commands via the SITE EXEC command..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 10/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.cert.org/advisories/CA-2000-13.html
- ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-2000.02
- http://www.calderasystems.com/support/security/advisories/CSSA-2000-020.0.txt
- http://www.redhat.com/support/errata/RHSA-2000-039.html
- http://archives.neohapsis.com/archives/bugtraq/2000-06/0244.html
- http://archives.neohapsis.com/archives/bugtraq/2000-07/0017.html
- ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:29.wu-ftpd.asc.v1.1
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2000-009.txt.asc
- http://www.securityfocus.com/bid/1387
- http://marc.info/?l=bugtraq&m=96171893218000&w=2
- http://marc.info/?l=bugtraq&m=96299933720862&w=2
- http://marc.info/?l=bugtraq&m=96179429114160&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/4773
- http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000623091822.3321.qmail