Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0075: PASV core dump in wu-ftpd daemon when attacker uses a QUOTE PASV command after specifying a username

0
Medium
VulnerabilityCVE-1999-0075cve-1999-0075
Published: Wed Oct 16 1996 (10/16/1996, 04:00:00 UTC)
Source: NVD
Vendor/Project: washington_university
Product: wu-ftpd

Description

PASV core dump in wu-ftpd daemon when attacker uses a QUOTE PASV command after specifying a username and password.

AI-Powered Analysis

AILast updated: 07/02/2025, 00:40:54 UTC

Technical Analysis

CVE-1999-0075 is a medium-severity vulnerability affecting the wu-ftpd daemon, a widely used FTP server software developed by Washington University. The vulnerability arises when an attacker issues a QUOTE PASV command after successfully specifying a username and password. This sequence causes the wu-ftpd daemon to experience a core dump, effectively crashing the service. The vulnerability is triggered without requiring any authentication (Au:N), and the attack vector is network-based (AV:N) with low attack complexity (AC:L). While the vulnerability does not directly compromise confidentiality or availability, it impacts integrity by potentially disrupting the normal operation of the FTP service. The core dump could also potentially be leveraged for further exploitation if additional vulnerabilities exist, although no known exploits are reported in the wild. The vulnerability was published in 1996, and no patches are available, likely due to the age and obsolescence of the wu-ftpd software. The CVSS score of 5.0 reflects a medium severity, primarily due to the denial of service-like impact and the lack of authentication required to trigger it.

Potential Impact

For European organizations, the impact of this vulnerability is primarily related to service disruption. Organizations using wu-ftpd servers could experience unexpected crashes, leading to denial of FTP services, which may affect file transfers critical to business operations. Although the vulnerability does not allow unauthorized data access or modification directly, the interruption of FTP services can impact workflows, especially in sectors relying on FTP for automated data exchange such as manufacturing, logistics, and finance. Given the age of the vulnerability and the decline in wu-ftpd usage in favor of more secure FTP alternatives, the overall risk is reduced but still relevant for legacy systems. Additionally, any downtime caused by this vulnerability could have compliance implications under regulations such as GDPR if it affects the availability of personal data processing systems.

Mitigation Recommendations

Since no patch is available for this vulnerability, European organizations should consider the following specific mitigation strategies: 1) Replace wu-ftpd with modern, actively maintained FTP server software that supports secure protocols such as FTPS or SFTP. 2) If replacement is not immediately feasible, restrict access to the FTP server using network-level controls such as firewalls and VPNs to limit exposure to trusted internal networks only. 3) Monitor FTP server logs for unusual QUOTE PASV commands or repeated connection attempts that could indicate exploitation attempts. 4) Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect and block attempts to exploit this vulnerability. 5) Conduct regular security audits and vulnerability assessments to identify legacy software usage and plan for timely upgrades or decommissioning. 6) Educate IT staff about the risks of legacy FTP servers and the importance of migrating to secure file transfer solutions.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de53b

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 12:40:54 AM

Last updated: 2/7/2026, 6:54:00 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats