CVE-1999-0075: PASV core dump in wu-ftpd daemon when attacker uses a QUOTE PASV command after specifying a username
PASV core dump in wu-ftpd daemon when attacker uses a QUOTE PASV command after specifying a username and password.
AI Analysis
Technical Summary
CVE-1999-0075 is a medium-severity vulnerability affecting the wu-ftpd daemon, a widely used FTP server software developed by Washington University. The vulnerability arises when an attacker issues a QUOTE PASV command after successfully specifying a username and password. This sequence causes the wu-ftpd daemon to experience a core dump, effectively crashing the service. The vulnerability is triggered without requiring any authentication (Au:N), and the attack vector is network-based (AV:N) with low attack complexity (AC:L). While the vulnerability does not directly compromise confidentiality or availability, it impacts integrity by potentially disrupting the normal operation of the FTP service. The core dump could also potentially be leveraged for further exploitation if additional vulnerabilities exist, although no known exploits are reported in the wild. The vulnerability was published in 1996, and no patches are available, likely due to the age and obsolescence of the wu-ftpd software. The CVSS score of 5.0 reflects a medium severity, primarily due to the denial of service-like impact and the lack of authentication required to trigger it.
Potential Impact
For European organizations, the impact of this vulnerability is primarily related to service disruption. Organizations using wu-ftpd servers could experience unexpected crashes, leading to denial of FTP services, which may affect file transfers critical to business operations. Although the vulnerability does not allow unauthorized data access or modification directly, the interruption of FTP services can impact workflows, especially in sectors relying on FTP for automated data exchange such as manufacturing, logistics, and finance. Given the age of the vulnerability and the decline in wu-ftpd usage in favor of more secure FTP alternatives, the overall risk is reduced but still relevant for legacy systems. Additionally, any downtime caused by this vulnerability could have compliance implications under regulations such as GDPR if it affects the availability of personal data processing systems.
Mitigation Recommendations
Since no patch is available for this vulnerability, European organizations should consider the following specific mitigation strategies: 1) Replace wu-ftpd with modern, actively maintained FTP server software that supports secure protocols such as FTPS or SFTP. 2) If replacement is not immediately feasible, restrict access to the FTP server using network-level controls such as firewalls and VPNs to limit exposure to trusted internal networks only. 3) Monitor FTP server logs for unusual QUOTE PASV commands or repeated connection attempts that could indicate exploitation attempts. 4) Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect and block attempts to exploit this vulnerability. 5) Conduct regular security audits and vulnerability assessments to identify legacy software usage and plan for timely upgrades or decommissioning. 6) Educate IT staff about the risks of legacy FTP servers and the importance of migrating to secure file transfer solutions.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-1999-0075: PASV core dump in wu-ftpd daemon when attacker uses a QUOTE PASV command after specifying a username
Description
PASV core dump in wu-ftpd daemon when attacker uses a QUOTE PASV command after specifying a username and password.
AI-Powered Analysis
Technical Analysis
CVE-1999-0075 is a medium-severity vulnerability affecting the wu-ftpd daemon, a widely used FTP server software developed by Washington University. The vulnerability arises when an attacker issues a QUOTE PASV command after successfully specifying a username and password. This sequence causes the wu-ftpd daemon to experience a core dump, effectively crashing the service. The vulnerability is triggered without requiring any authentication (Au:N), and the attack vector is network-based (AV:N) with low attack complexity (AC:L). While the vulnerability does not directly compromise confidentiality or availability, it impacts integrity by potentially disrupting the normal operation of the FTP service. The core dump could also potentially be leveraged for further exploitation if additional vulnerabilities exist, although no known exploits are reported in the wild. The vulnerability was published in 1996, and no patches are available, likely due to the age and obsolescence of the wu-ftpd software. The CVSS score of 5.0 reflects a medium severity, primarily due to the denial of service-like impact and the lack of authentication required to trigger it.
Potential Impact
For European organizations, the impact of this vulnerability is primarily related to service disruption. Organizations using wu-ftpd servers could experience unexpected crashes, leading to denial of FTP services, which may affect file transfers critical to business operations. Although the vulnerability does not allow unauthorized data access or modification directly, the interruption of FTP services can impact workflows, especially in sectors relying on FTP for automated data exchange such as manufacturing, logistics, and finance. Given the age of the vulnerability and the decline in wu-ftpd usage in favor of more secure FTP alternatives, the overall risk is reduced but still relevant for legacy systems. Additionally, any downtime caused by this vulnerability could have compliance implications under regulations such as GDPR if it affects the availability of personal data processing systems.
Mitigation Recommendations
Since no patch is available for this vulnerability, European organizations should consider the following specific mitigation strategies: 1) Replace wu-ftpd with modern, actively maintained FTP server software that supports secure protocols such as FTPS or SFTP. 2) If replacement is not immediately feasible, restrict access to the FTP server using network-level controls such as firewalls and VPNs to limit exposure to trusted internal networks only. 3) Monitor FTP server logs for unusual QUOTE PASV commands or repeated connection attempts that could indicate exploitation attempts. 4) Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect and block attempts to exploit this vulnerability. 5) Conduct regular security audits and vulnerability assessments to identify legacy software usage and plan for timely upgrades or decommissioning. 6) Educate IT staff about the risks of legacy FTP servers and the importance of migrating to secure file transfer solutions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32ab6fd31d6ed7de53b
Added to database: 5/20/2025, 3:43:38 PM
Last enriched: 7/2/2025, 12:40:54 AM
Last updated: 7/30/2025, 7:46:05 PM
Views: 10
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumCVE-2025-8464: CWE-23 Relative Path Traversal in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
MediumCVE-2025-7499: CWE-862 Missing Authorization in wpdevteam BetterDocs – Advanced AI-Driven Documentation, FAQ & Knowledge Base Tool for Elementor & Gutenberg with Encyclopedia, AI Support, Instant Answers
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.