Skip to main content

CVE-1999-0075: PASV core dump in wu-ftpd daemon when attacker uses a QUOTE PASV command after specifying a username

Medium
VulnerabilityCVE-1999-0075cve-1999-0075
Published: Wed Oct 16 1996 (10/16/1996, 04:00:00 UTC)
Source: NVD
Vendor/Project: washington_university
Product: wu-ftpd

Description

PASV core dump in wu-ftpd daemon when attacker uses a QUOTE PASV command after specifying a username and password.

AI-Powered Analysis

AILast updated: 07/02/2025, 00:40:54 UTC

Technical Analysis

CVE-1999-0075 is a medium-severity vulnerability affecting the wu-ftpd daemon, a widely used FTP server software developed by Washington University. The vulnerability arises when an attacker issues a QUOTE PASV command after successfully specifying a username and password. This sequence causes the wu-ftpd daemon to experience a core dump, effectively crashing the service. The vulnerability is triggered without requiring any authentication (Au:N), and the attack vector is network-based (AV:N) with low attack complexity (AC:L). While the vulnerability does not directly compromise confidentiality or availability, it impacts integrity by potentially disrupting the normal operation of the FTP service. The core dump could also potentially be leveraged for further exploitation if additional vulnerabilities exist, although no known exploits are reported in the wild. The vulnerability was published in 1996, and no patches are available, likely due to the age and obsolescence of the wu-ftpd software. The CVSS score of 5.0 reflects a medium severity, primarily due to the denial of service-like impact and the lack of authentication required to trigger it.

Potential Impact

For European organizations, the impact of this vulnerability is primarily related to service disruption. Organizations using wu-ftpd servers could experience unexpected crashes, leading to denial of FTP services, which may affect file transfers critical to business operations. Although the vulnerability does not allow unauthorized data access or modification directly, the interruption of FTP services can impact workflows, especially in sectors relying on FTP for automated data exchange such as manufacturing, logistics, and finance. Given the age of the vulnerability and the decline in wu-ftpd usage in favor of more secure FTP alternatives, the overall risk is reduced but still relevant for legacy systems. Additionally, any downtime caused by this vulnerability could have compliance implications under regulations such as GDPR if it affects the availability of personal data processing systems.

Mitigation Recommendations

Since no patch is available for this vulnerability, European organizations should consider the following specific mitigation strategies: 1) Replace wu-ftpd with modern, actively maintained FTP server software that supports secure protocols such as FTPS or SFTP. 2) If replacement is not immediately feasible, restrict access to the FTP server using network-level controls such as firewalls and VPNs to limit exposure to trusted internal networks only. 3) Monitor FTP server logs for unusual QUOTE PASV commands or repeated connection attempts that could indicate exploitation attempts. 4) Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect and block attempts to exploit this vulnerability. 5) Conduct regular security audits and vulnerability assessments to identify legacy software usage and plan for timely upgrades or decommissioning. 6) Educate IT staff about the risks of legacy FTP servers and the importance of migrating to secure file transfer solutions.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de53b

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 12:40:54 AM

Last updated: 7/30/2025, 7:46:05 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats