Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0997: wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name

0
High
VulnerabilityCVE-1999-0997cve-1999-0997
Published: Mon Dec 20 1999 (12/20/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: millenux_gmbh
Product: anonftp

Description

wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress.

AI-Powered Analysis

AILast updated: 06/25/2025, 18:13:48 UTC

Technical Analysis

CVE-1999-0997 is a high-severity vulnerability affecting the wu-ftp server software, specifically when FTP conversion is enabled. The vulnerability arises because wu-ftp processes certain file names through external conversion programs such as tar or uncompress. An attacker can craft a malformed file name that is interpreted as a command-line argument to these conversion utilities. This improper handling allows the attacker to execute arbitrary commands on the server without authentication. The affected product is 'anonftp' by millenux_gmbh, with vulnerable versions including 2.4.2, 2.5.0, 2.6.0, 2.8.1, 5.2, 6.0, and 6.1. The vulnerability was published in December 1999 and has a CVSS v2 score of 7.5, indicating high severity. The vector metrics show that the attack can be performed remotely (AV:N), with low attack complexity (AC:L), no authentication required (Au:N), and impacts confidentiality, integrity, and availability (C:P/I:P/A:P). No patches are available, and no known exploits have been reported in the wild, likely due to the age of the software and its declining usage. The core issue is the unsafe passing of user-controlled input (file names) to system commands without proper sanitization, leading to command injection. This vulnerability is critical in environments where wu-ftp with conversion is still in use, as it allows remote attackers to gain control over the server, potentially leading to data theft, system compromise, or denial of service.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on whether wu-ftp servers with FTP conversion enabled are still operational within their infrastructure. Given the age of the vulnerability and the obsolescence of wu-ftp in modern environments, the direct impact may be limited. However, legacy systems in critical sectors such as manufacturing, utilities, or government agencies might still run vulnerable versions, especially in environments with long system lifecycles. Exploitation could lead to unauthorized command execution, resulting in data breaches, system manipulation, or service disruption. This could compromise sensitive information, disrupt business operations, and damage organizational reputation. Additionally, if exploited within critical infrastructure or governmental networks, the consequences could extend to national security or public safety. The lack of available patches means organizations must rely on mitigation or replacement strategies. The vulnerability’s remote and unauthenticated nature increases risk, as attackers do not need prior access or credentials to exploit it.

Mitigation Recommendations

Immediately identify and inventory any wu-ftp servers in use, particularly those with FTP conversion enabled. Disable FTP conversion features if disabling is possible without impacting business processes, as this is the root cause of the vulnerability. If wu-ftp is still required, isolate the FTP servers within segmented network zones with strict firewall rules to limit exposure to untrusted networks. Replace wu-ftp with modern, actively maintained FTP server software that does not have this vulnerability and supports secure protocols such as FTPS or SFTP. Implement strict input validation and sanitization on any file names or user inputs processed by server-side utilities to prevent command injection. Monitor network traffic and system logs for unusual FTP activity or unexpected command executions that could indicate exploitation attempts. Apply host-based intrusion detection systems (HIDS) to detect anomalous behavior on FTP servers. Develop and enforce a decommissioning plan for legacy systems running outdated software to reduce attack surface. Educate system administrators about the risks of legacy FTP servers and the importance of timely upgrades and secure configurations.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7df51a

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/25/2025, 6:13:48 PM

Last updated: 2/7/2026, 2:44:34 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats