5
CVSSv2

CVE-2007-5300

Published: 09/10/2007 Updated: 19/10/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Off-by-one error in the do_login_loop function in libwzd-core/wzd_login.c in wzdftpd 0.8.0, 0.8.2, and possibly other versions allows remote malicious users to cause a denial of service (daemon crash) via a long USER command that triggers a stack-based buffer overflow. NOTE: some of these details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

wzdftpd wzdftpd 0.8.0

wzdftpd wzdftpd 0.8.2

Vendor Advisories

k1tk4t discovered that wzdftpd, a portable, modular, small and efficient ftp server, did not correctly handle the receipt of long usernames This could allow remote users to cause the daemon to exit For the old stable distribution (sarge), this problem has been fixed in version 052-11sarge3 For the stable distribution (etch), this problem has ...

Exploits

# Indonesian Newhack Security Advisory # ------------------------------------ # wzdftpd <= 080 (USER) Remote Danial of Service # Waktu : Oct 07 2007 05:00AM # Software : wzdftpd 080 # Version : 080 Linux and Windows # Vendor : wwwwzdftpdnet/ # Ditemukan oleh : k1tk4t | newhackorg # ...