Skip to main content

CVE-1999-0950: Buffer overflow in WFTPD FTP server allows remote attackers to gain root access via a series of MKD

High
VulnerabilityCVE-1999-0950cve-1999-0950buffer overflow
Published: Thu Oct 28 1999 (10/28/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: texas_imperial_software
Product: wftpd

Description

Buffer overflow in WFTPD FTP server allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories.

AI-Powered Analysis

AILast updated: 06/27/2025, 13:03:37 UTC

Technical Analysis

CVE-1999-0950 is a critical buffer overflow vulnerability found in the WFTPD FTP server versions 2.34 and 2.40, developed by Texas Imperial Software. The vulnerability arises from improper handling of a sequence of FTP commands, specifically the MKD (make directory) and CWD (change working directory) commands, which can be used to create nested directories. By exploiting this flaw, a remote attacker can overflow a buffer in the server's memory, leading to arbitrary code execution with root privileges. This means an unauthenticated attacker can remotely gain full control over the affected system without any user interaction or prior authentication. The vulnerability has a CVSS score of 10.0, reflecting its critical nature, with an attack vector that is network-based, requiring no authentication, and resulting in complete compromise of confidentiality, integrity, and availability. Despite its age and severity, no official patch is available for this vulnerability, and no known exploits have been reported in the wild. However, the theoretical risk remains significant due to the ease of exploitation and the potential impact on affected systems.

Potential Impact

For European organizations, the impact of this vulnerability can be severe if they are running legacy systems that still use WFTPD versions 2.34 or 2.40. Successful exploitation would allow attackers to gain root access, enabling them to steal sensitive data, disrupt services, implant malware, or use the compromised server as a pivot point for further attacks within the network. This could lead to data breaches, operational downtime, and damage to organizational reputation. Critical infrastructure, government agencies, and enterprises relying on legacy FTP servers for file transfers are particularly at risk. Given the lack of patches, organizations face a heightened risk if they have not migrated to more secure FTP solutions or implemented compensating controls. The vulnerability's network-based nature means it can be exploited remotely, increasing the attack surface and risk exposure for organizations with internet-facing FTP servers.

Mitigation Recommendations

Since no official patch is available, European organizations should take immediate steps to mitigate the risk. First, discontinue the use of WFTPD versions 2.34 and 2.40 and migrate to modern, actively maintained FTP server software that includes security updates. If migration is not immediately feasible, restrict access to the vulnerable FTP servers by implementing strict network segmentation and firewall rules to limit connections only to trusted IP addresses. Employ intrusion detection and prevention systems (IDS/IPS) to monitor for suspicious FTP commands, particularly sequences of MKD and CWD commands that could indicate exploitation attempts. Additionally, consider disabling the MKD and CWD commands if possible or replacing FTP with more secure file transfer protocols such as SFTP or FTPS. Regularly audit and monitor logs for unusual directory creation patterns. Finally, educate IT staff about the risks of legacy software and the importance of timely updates and replacements.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df349

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 1:03:37 PM

Last updated: 7/29/2025, 7:54:26 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats