Description
Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow attackers to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buffer overflow, including (1) STOR, (2) RETR, (3) APPE, (4) DELE, (5) MKD, (6) RMD, (7) STOU, or (8) RNTO.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Apple
Subscribe
Mac Os X
Subscribe
Mac Os X Server
Subscribe
Freebsd
Subscribe
Freebsd
Subscribe
Netbsd
Subscribe
Netbsd
Subscribe
Openbsd
Subscribe
Openbsd
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Linux
Subscribe
Wu Ftpd
Subscribe
Sun
Subscribe
Solaris
Subscribe
Wuftpd
Subscribe
Wu-ftpd
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T01:58:10.161Z
Reserved: 2003-06-26T00:00:00.000Z
Link: CVE-2003-0466
No data.
Status : Modified
Published: 2003-08-27T04:00:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2003-0466
OpenCVE Enrichment
No data.
Weaknesses