mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-30 18:04:30 +00:00
193 lines
6.3 KiB
JSON
193 lines
6.3 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2003-0466",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow attackers to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buffer overflow, including (1) STOR, (2) RETR, (3) APPE, (4) DELE, (5) MKD, (6) RMD, (7) STOU, or (8) RNTO."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20030731 wu-ftpd fb_realpath() off-by-one bug",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://marc.info/?l=bugtraq&m=105967301604815&w=2"
|
|
},
|
|
{
|
|
"name" : "20030731 wu-ftpd fb_realpath() off-by-one bug",
|
|
"refsource" : "VULNWATCH",
|
|
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0065.html"
|
|
},
|
|
{
|
|
"name" : "http://isec.pl/vulnerabilities/isec-0011-wu-ftpd.txt",
|
|
"refsource" : "MISC",
|
|
"url" : "http://isec.pl/vulnerabilities/isec-0011-wu-ftpd.txt"
|
|
},
|
|
{
|
|
"name" : "20030804 Off-by-one Buffer Overflow Vulnerability in BSD libc realpath(3)",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://marc.info/?l=bugtraq&m=106002488209129&w=2"
|
|
},
|
|
{
|
|
"name" : "20030804 wu-ftpd-2.6.2 off-by-one remote exploit.",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://marc.info/?l=bugtraq&m=106001702232325&w=2"
|
|
},
|
|
{
|
|
"name" : "RHSA-2003:245",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://www.redhat.com/support/errata/RHSA-2003-245.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2003:246",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://www.redhat.com/support/errata/RHSA-2003-246.html"
|
|
},
|
|
{
|
|
"name" : "1001257",
|
|
"refsource" : "SUNALERT",
|
|
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001257.1-1"
|
|
},
|
|
{
|
|
"name" : "SuSE-SA:2003:032",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://www.novell.com/linux/security/advisories/2003_032_wuftpd.html"
|
|
},
|
|
{
|
|
"name" : "MDKSA-2003:080",
|
|
"refsource" : "MANDRAKE",
|
|
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2003:080"
|
|
},
|
|
{
|
|
"name" : "DSA-357",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2003/dsa-357"
|
|
},
|
|
{
|
|
"name" : "FreeBSD-SA-03:08",
|
|
"refsource" : "FREEBSD",
|
|
"url" : "http://marc.info/?l=bugtraq&m=106001410028809&w=2"
|
|
},
|
|
{
|
|
"name" : "NetBSD-SA2003-011.txt.asc",
|
|
"refsource" : "NETBSD",
|
|
"url" : "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-011.txt.asc"
|
|
},
|
|
{
|
|
"name" : "TLSA-2003-46",
|
|
"refsource" : "TURBO",
|
|
"url" : "http://www.turbolinux.com/security/TLSA-2003-46.txt"
|
|
},
|
|
{
|
|
"name" : "IMNX-2003-7+-019-01",
|
|
"refsource" : "IMMUNIX",
|
|
"url" : "http://download.immunix.org/ImmunixOS/7+/Updates/errata/IMNX-2003-7+-019-01"
|
|
},
|
|
{
|
|
"name" : "20060213 Latest wu-ftpd exploit :-s",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://www.securityfocus.com/archive/1/424852/100/0/threaded"
|
|
},
|
|
{
|
|
"name" : "20060214 Re: Latest wu-ftpd exploit :-s",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://www.securityfocus.com/archive/1/425061/100/0/threaded"
|
|
},
|
|
{
|
|
"name" : "VU#743092",
|
|
"refsource" : "CERT-VN",
|
|
"url" : "http://www.kb.cert.org/vuls/id/743092"
|
|
},
|
|
{
|
|
"name" : "8315",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/8315"
|
|
},
|
|
{
|
|
"name" : "6602",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/6602"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:1970",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1970"
|
|
},
|
|
{
|
|
"name" : "1007380",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1007380"
|
|
},
|
|
{
|
|
"name" : "9423",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/9423"
|
|
},
|
|
{
|
|
"name" : "9446",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/9446"
|
|
},
|
|
{
|
|
"name" : "9447",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/9447"
|
|
},
|
|
{
|
|
"name" : "9535",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/9535"
|
|
},
|
|
{
|
|
"name" : "libc-realpath-offbyone-bo(12785)",
|
|
"refsource" : "XF",
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/12785"
|
|
}
|
|
]
|
|
}
|
|
}
|