Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

wu-ftpd ABOR privilege escalation

Information

Severity

Severity

Medium

Family

Family

FTP

CVSSv2 Base

CVSSv2 Base

5.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:N

Solution Type

Solution Type

Vendor Patch

Created

Created

18 years ago

Modified

Modified

5 years ago

Summary

The remote Wu-FTPd server seems to be vulnerable to a remote privilege escalation.

Insight

Insight

This version contains a flaw that may allow a malicious user to gain access to unauthorized privileges. Specifically, there is a flaw in the way that the server handles an ABOR command after a data connection has been closed. The flaw is within the dologout() function and proper exploitation will give the remote attacker the ability to execute arbitrary code as the 'root' user.

Solution

Solution

Upgrade to Wu-FTPd 2.4.2 or newer.

Common Vulnerabilities and Exposures (CVE)