Vulnerability Details : CVE-2005-0256
The wu_fnmatch function in wu_fnmatch.c in wu-ftpd 2.6.1 and 2.6.2 allows remote attackers to cause a denial of service (CPU exhaustion by recursion) via a glob pattern with a large number of * (wildcard) characters, as demonstrated using the dir command.
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2005-0256
Probability of exploitation activity in the next 30 days: 6.00%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 92 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-0256
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
nvd@nist.gov |
CWE ids for CVE-2005-0256
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2005-0256
-
Red Hat 2006-10-23Not vulnerable. Red Hat Enterprise Linux 2.1 shipped with wu-ftpd, however we were unable to reproduce this issue. Additionally, a code analysis showed that attempts to exploit this issue would be caught in the versions we shipped. http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=149720
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1333
-
http://www.debian.org/security/2005/dsa-705
Patch;Vendor Advisory
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57795-1
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1762
-
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00637342
-
http://www.idefense.com/application/poi/display?id=207&type=vulnerabilities
Exploit
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1265
-
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.63/SCOSA-2005.63.txt
-
http://www.vupen.com/english/advisories/2005/0588
Vendor Advisory
-
http://www.vupen.com/english/advisories/2006/1271
Vendor Advisory
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101699-1
- cpe:2.3:a:washington_university:wu-ftpd:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.6.2:*:*:*:*:*:*:*