Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0955: Race condition in wu-ftpd and BSDI ftpd allows remote attackers to gain root access via the SITE EXE

0
High
VulnerabilityCVE-1999-0955cve-1999-0955
Published: Tue Sep 23 1997 (09/23/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: washington_university
Product: wu-ftpd

Description

Race condition in wu-ftpd and BSDI ftpd allows remote attackers to gain root access via the SITE EXEC command.

AI-Powered Analysis

AILast updated: 06/30/2025, 14:57:51 UTC

Technical Analysis

CVE-1999-0955 is a high-severity vulnerability identified in the wu-ftpd and BSDI ftpd FTP server implementations, specifically affecting wu-ftpd version 2.4.1. The vulnerability arises from a race condition triggered by the handling of the SITE EXEC command. This command allows remote attackers to execute arbitrary commands on the FTP server. Due to the race condition, an attacker can exploit timing discrepancies in the server's processing to escalate privileges and gain root-level access. The vulnerability is remotely exploitable without authentication, meaning that any unauthenticated attacker with network access to the FTP service can attempt to leverage this flaw. The CVSS v2 score of 7.6 reflects the high impact on confidentiality, integrity, and availability, although the attack complexity is high due to the timing-based nature of the race condition. No patches are available for this vulnerability, and no known exploits are currently documented in the wild, likely due to the age of the vulnerability and the decline in usage of wu-ftpd. However, the fundamental risk remains significant for legacy systems still running vulnerable versions. The vulnerability affects core system security by allowing complete system compromise, which can lead to unauthorized data access, system manipulation, and service disruption.

Potential Impact

For European organizations, the impact of CVE-1999-0955 can be severe if legacy systems running vulnerable versions of wu-ftpd or BSDI ftpd are still in operation. Such systems could be found in industrial environments, research institutions, or organizations with outdated infrastructure. Successful exploitation would allow attackers to gain root access, leading to full system compromise, data breaches, and potential lateral movement within the network. This could result in loss of sensitive information, disruption of critical services, and damage to organizational reputation. Given the vulnerability requires no authentication and can be exploited remotely, exposed FTP servers represent a significant attack surface. Although modern FTP servers and security practices have largely replaced wu-ftpd, some European organizations with legacy systems or insufficient patch management may remain at risk. The lack of available patches means organizations must rely on mitigation and replacement strategies to reduce exposure.

Mitigation Recommendations

Since no official patches are available for CVE-1999-0955, European organizations should prioritize the following specific mitigation steps: 1) Immediate identification and inventory of all FTP servers running wu-ftpd 2.4.1 or BSDI ftpd versions vulnerable to this race condition. 2) Disable or decommission vulnerable FTP services, especially those exposed to untrusted networks or the internet. 3) Replace vulnerable FTP servers with modern, actively maintained FTP server software that includes secure command handling and privilege separation. 4) Implement network-level controls such as firewall rules to restrict access to FTP services only to trusted internal hosts or VPN users. 5) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect anomalous FTP SITE EXEC command usage. 6) Conduct regular security audits and vulnerability scans to ensure no legacy vulnerable FTP servers remain operational. 7) Where legacy FTP usage is unavoidable, isolate these systems in segmented network zones with strict access controls and continuous monitoring. 8) Educate IT staff about the risks of legacy FTP services and the importance of timely upgrades and decommissioning of outdated software.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7de7e5

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/30/2025, 2:57:51 PM

Last updated: 2/7/2026, 7:41:12 AM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats