Skip to main content

CVE-1999-0880: Denial of service in WU-FTPD via the SITE NEWER command, which does not free memory properly.

Medium
VulnerabilityCVE-1999-0880cve-1999-0880denial of service
Published: Fri Oct 01 1999 (10/01/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: bsdi
Product: bsd_os

Description

Denial of service in WU-FTPD via the SITE NEWER command, which does not free memory properly.

AI-Powered Analysis

AILast updated: 07/01/2025, 14:58:54 UTC

Technical Analysis

CVE-1999-0880 is a vulnerability affecting the WU-FTPD (Washington University FTP Daemon) service running on BSD operating systems, specifically versions 1.0, 2.1, and 3.0. The vulnerability arises from improper memory management in the handling of the SITE NEWER command. When this command is issued, the FTP daemon fails to correctly free allocated memory, leading to a memory leak that can be exploited to cause a denial of service (DoS). This DoS condition results in the exhaustion of system resources, potentially causing the FTP service or the entire system to become unresponsive or crash. The vulnerability does not affect confidentiality or integrity, as it does not allow unauthorized data access or modification, but it impacts availability by disrupting the FTP service. The CVSS score of 5.0 (medium severity) reflects the network accessibility of the vulnerability (no authentication required), low attack complexity, and the impact limited to availability. No patches are available for this vulnerability, and there are no known exploits in the wild, indicating limited active exploitation. However, the affected software is relatively old and less commonly used in modern environments, which reduces the overall risk today.

Potential Impact

For European organizations, the impact of this vulnerability is primarily related to service availability. Organizations that still operate legacy BSD systems running vulnerable versions of WU-FTPD could experience service interruptions if targeted. This could disrupt file transfer operations critical to business processes, especially in sectors relying on FTP for legacy data exchange. While modern FTP servers and protocols have largely replaced WU-FTPD, some industrial, academic, or governmental institutions may still use these older systems. The denial of service could lead to operational downtime, affecting productivity and potentially causing delays in data processing or transfer. However, given the age of the vulnerability and the lack of known active exploits, the immediate risk to most European organizations is low. Nonetheless, organizations with legacy infrastructure should be aware of this risk and plan accordingly.

Mitigation Recommendations

Since no official patches are available for this vulnerability, mitigation requires alternative strategies. Organizations should first identify any systems running vulnerable versions of WU-FTPD on BSD operating systems. If such systems are found, consider the following measures: 1) Disable or restrict access to the FTP service, especially from untrusted networks, using firewalls or network segmentation to limit exposure. 2) Replace WU-FTPD with a modern, actively maintained FTP server that does not have this vulnerability. 3) If replacement is not immediately feasible, monitor FTP service logs for unusual SITE NEWER command usage that could indicate attempted exploitation. 4) Implement resource limits and monitoring on affected systems to detect and mitigate memory exhaustion conditions early. 5) Educate system administrators about the risks of legacy software and encourage migration to supported platforms. These steps will help reduce the risk of denial of service attacks exploiting this vulnerability.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df2b0

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 2:58:54 PM

Last updated: 7/30/2025, 9:54:23 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats