ID CVE-2000-0943
Summary Buffer overflow in bftp daemon (bftpd) 1.0.11 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long USER command.
References
Vulnerable Configurations
  • cpe:2.3:a:max-wilhelm_bruker:bftpd:1.0.11
    cpe:2.3:a:max-wilhelm_bruker:bftpd:1.0.11
CVSS
Base: 7.5 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family FTP
    NASL id FTP_OVERFLOW.NASL
    description The remote FTP server closes the connection when a command or argument is too long. This is probably due to a buffer overflow and may allow an attacker to execute arbitrary code on the remote host.
    last seen 2019-02-21
    modified 2018-08-31
    plugin id 10084
    published 1999-06-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=10084
    title Multiple FTP Server Command Handling Overflow
  • NASL family FTP
    NASL id BFTPD_CHOWN.NASL
    description The version of bftpd running on the remote host is vulnerable to a remote buffer overflow attack when issued very long arguments to the SITE CHOWN command. A remote attacker could exploit this issue to crash the FTP server, or possibly execute arbitrary code.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 10579
    published 2000-12-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=10579
    title bftpd Multiple Command Remote Overflow
refmap via4
bid 1858
bugtraq 20001027 Potential Security Problem in bftpd-1.0.11
xf bftpd-user-bo(5426)
Last major update 05-09-2008 - 16:22
Published 19-12-2000 - 00:00
Last modified 09-10-2017 - 21:29
Back to Top