Skip to main content

CVE-1999-0911: Buffer overflow in ProFTPD, wu-ftpd, and beroftpd allows remote attackers to gain root access via a

High
VulnerabilityCVE-1999-0911cve-1999-0911buffer overflow
Published: Fri Aug 27 1999 (08/27/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: proftpd_project
Product: proftpd

Description

Buffer overflow in ProFTPD, wu-ftpd, and beroftpd allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories.

AI-Powered Analysis

AILast updated: 06/27/2025, 17:26:02 UTC

Technical Analysis

CVE-1999-0911 is a critical buffer overflow vulnerability affecting early pre-release versions of the ProFTPD FTP server software (versions 1.2_pre1 through 1.2_pre5), as well as wu-ftpd and beroftpd FTP servers. The vulnerability arises from improper handling of a sequence of FTP commands, specifically MKD (make directory) and CWD (change working directory), which can be used to create nested directories. By exploiting this flaw, a remote attacker can trigger a buffer overflow condition that overwrites memory, potentially allowing arbitrary code execution with root privileges on the affected server. The vulnerability requires no authentication and can be exploited remotely over the network, making it highly dangerous. The CVSS v2 base score of 10.0 reflects the maximum severity, indicating complete compromise of confidentiality, integrity, and availability without any user interaction or authentication. Despite its age and the fact that no patches are available for these early pre-release versions, this vulnerability remains a textbook example of critical FTP server security flaws that can lead to full system takeover.

Potential Impact

For European organizations still running legacy or unpatched FTP servers based on these early ProFTPD versions or similar vulnerable FTP daemons like wu-ftpd and beroftpd, the impact could be devastating. Successful exploitation would grant attackers root-level access, enabling them to steal sensitive data, modify or delete critical files, install persistent backdoors, or disrupt services entirely. Given the FTP protocol's common use for file transfers in many industries, including manufacturing, finance, and government, compromised servers could lead to significant data breaches and operational downtime. The lack of authentication requirement and remote exploitability increase the risk of automated scanning and attacks, potentially affecting organizations with exposed FTP services. While modern FTP servers and configurations have largely mitigated this risk, any legacy infrastructure still in use in Europe remains vulnerable, posing a high risk to confidentiality, integrity, and availability of critical systems.

Mitigation Recommendations

Since no patches are available for these specific early pre-release versions, the primary mitigation is to immediately upgrade to a supported, secure version of ProFTPD or alternative FTP server software that has addressed this vulnerability. Organizations should audit their infrastructure to identify any legacy FTP servers running these or similar vulnerable versions and decommission or upgrade them promptly. Additionally, FTP services should be restricted via network controls such as firewalls and VPNs to limit exposure to trusted networks only. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for anomalous MKD and CWD command sequences can help detect exploitation attempts. Where FTP is necessary, consider replacing it with more secure file transfer protocols like SFTP or FTPS. Regular vulnerability scanning and penetration testing should be conducted to ensure no vulnerable FTP servers remain accessible. Finally, monitoring system logs for unusual directory creation patterns or unexpected root-level activity can provide early warning of exploitation attempts.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df1e4

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 5:26:02 PM

Last updated: 8/8/2025, 8:24:57 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats