CVE-2005-0256
Summary
| CVE | CVE-2005-0256 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-05-02 04:00:00 UTC |
| Updated | 2017-10-11 01:29:00 UTC |
| Description | The wu_fnmatch function in wu_fnmatch.c in wu-ftpd 2.6.1 and 2.6.2 allows remote attackers to cause a denial of service (CPU exhaustion by recursion) via a glob pattern with a large number of * (wildcard) characters, as demonstrated using the dir command. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Repository / Oval Repository |
OVAL |
oval.cisecurity.org |
|
| #101699: Security Vulnerability in the WU-FTPD "wu_fnmatch" Function May Result in a Denial of Service (DoS) (formerly Document ID: 57795) |
SUNALERT |
sunsolve.sun.com |
|
| Repository / Oval Repository |
OVAL |
oval.cisecurity.org |
|
| SCOSA-2005.63 |
SCO |
ftp.sco.com |
|
| Debian -- Security Information -- DSA-705-1 wu-ftpd |
DEBIAN |
www.debian.org |
Patch, Vendor Advisory |
| Accenture | Let there be change |
IDEFENSE |
www.idefense.com |
Exploit |
| Secunia - Advisories - HP-UX update for wu-ftpd |
SECUNIA |
secunia.com |
Vendor Advisory |
| SSRT061110 |
HP |
itrc.hp.com |
|
| Repository / Oval Repository |
OVAL |
oval.cisecurity.org |
|
| Secunia - Advisories - SCO OpenServer update for wu-ftpd |
SECUNIA |
secunia.com |
Vendor Advisory |
| #101699: Security Vulnerability in the WU-FTPD "wu_fnmatch" Function May Result in a Denial of Service (DoS) (formerly Document ID: 57795) |
SUNALERT |
sunsolve.sun.com |
|
| Secunia - Advisories - WU-FTPD Wildcard Denial of Service Vulnerability |
SECUNIA |
secunia.com |
Vendor Advisory |
| Webmail - OVH |
VUPEN |
www.vupen.com |
Vendor Advisory |
| Webmail - OVH |
VUPEN |
www.vupen.com |
Vendor Advisory |
| 14203 |
OSVDB |
www.osvdb.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|
| Red Hat | 2006-10-23 | Mark J Cox | Not vulnerable. Red Hat Enterprise Linux 2.1 shipped with wu-ftpd, however we were unable to reproduce this issue. Additionally, a code analysis showed that attempts to exploit this issue would be caught in the versions we shipped. http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=149720 |
There are currently no legacy QID mappings associated with this CVE.