Description
Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow attackers to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buffer overflow, including (1) STOR, (2) RETR, (3) APPE, (4) DELE, (5) MKD, (6) RMD, (7) STOU, or (8) RNTO.
Product(s):
- Red Hat wu_ftpd 2.6.1.16
- Wu-ftpd
- Wuftpd Wu-ftpd 2.5.0
- Wuftpd Wu-ftpd 2.6.2
- Apple Mac OS X 10.2.6
- Apple Mac OS X Server 10.2.6
- FreeBSD
- FreeBSD 4.0
- FreeBSD 4.1.1
- FreeBSD 4.10
- FreeBSD 4.10 Patch 10
- FreeBSD 4.10 Patch 11
- FreeBSD 4.10 Patch 13
- FreeBSD 4.10 Patch 14
- FreeBSD 4.10 Patch 15
- FreeBSD 4.10 Patch 16
- FreeBSD 4.10 Patch 18
- FreeBSD 4.10 Patch 19
- FreeBSD 4.10 Patch 20
- FreeBSD 4.10 Patch 21
- FreeBSD 4.10 Patch 22
- FreeBSD 4.10 Patch 23
- FreeBSD 4.10 Patch 24
- FreeBSD 4.10 Patch 2
- FreeBSD 4.10 Patch 3
- FreeBSD 4.10 Patch 4
- FreeBSD 4.10 Patch 5
- FreeBSD 4.10 Patch 7
- FreeBSD 4.10 Patch 8
- FreeBSD 4.10 Patch 9
- FreeBSD 4.10 Release Candidate
- FreeBSD 4.11
- FreeBSD 4.11 Patch 10
- FreeBSD 4.11 Patch 11
- FreeBSD 4.11 Patch 12
- FreeBSD 4.11 Patch 13
- FreeBSD 4.11 Patch 14
- FreeBSD 4.11 Patch 15
- FreeBSD 4.11 Patch 16
- FreeBSD 4.11 Patch 17
- FreeBSD 4.11 Patch 18
- FreeBSD 4.11 Patch 19
- FreeBSD 4.11 Patch 1
- FreeBSD 4.11 Patch 20
- FreeBSD 4.11 Patch 21
- FreeBSD 4.11 Patch 22
- FreeBSD 4.11 Patch 24
- FreeBSD 4.11 Patch 25
- FreeBSD 4.11 Patch 26
- FreeBSD 4.11 Patch 2
- FreeBSD 4.11 Patch 3
- FreeBSD 4.11 Patch 4
- FreeBSD 4.11 Patch 5
- FreeBSD 4.11 Patch 6
- FreeBSD 4.11 Patch 8
- FreeBSD 4.11 Patch 9
- FreeBSD 4.1
- FreeBSD 4.2
- FreeBSD 4.3
- FreeBSD 4.3 Patch 24
- FreeBSD 4.3 Patch 37
- FreeBSD 4.3 Patch 38
- FreeBSD 4.3 Patch 40
- FreeBSD 4.3 Patch 41
- FreeBSD 4.3 Patch 42
- FreeBSD 4.3 Release Candidate
- FreeBSD 4.4
- FreeBSD 4.4 Patch 27
- FreeBSD 4.4 Patch 41
- FreeBSD 4.4 Patch 42
- FreeBSD 4.4 Patch 44
- FreeBSD 4.4 Patch 45
- FreeBSD 4.4 Patch 46
- FreeBSD 4.4 Patch 47
- FreeBSD 4.4 Patch 4
- FreeBSD 4.4 Patch 8
- FreeBSD 4.5
- FreeBSD 4.5 Patch 1
- FreeBSD 4.5 Patch 20
- FreeBSD 4.5 Patch 31
- FreeBSD 4.5 Patch 32
- FreeBSD 4.5 Patch 34
- FreeBSD 4.5 Patch 35
- FreeBSD 4.5 Patch 36
- FreeBSD 4.5 Patch 37
- FreeBSD 4.6.1
- FreeBSD 4.6.1 Patch 10
- FreeBSD 4.6.1 Patch 1
- FreeBSD 4.6.1 Patch 4
- FreeBSD 4.6.1 Patch 5
- FreeBSD 4.6.1 Patch 7
- FreeBSD 4.6.1 Patch 9
- FreeBSD 4.6.2
- FreeBSD 4.6.2 Patch 22
- +123 additional
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2003-0466, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2003-0466 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.