Skip to main content

CVE-1999-0997: wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name

High
VulnerabilityCVE-1999-0997cve-1999-0997
Published: Mon Dec 20 1999 (12/20/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: millenux_gmbh
Product: anonftp

Description

wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress.

AI-Powered Analysis

AILast updated: 06/25/2025, 18:13:48 UTC

Technical Analysis

CVE-1999-0997 is a high-severity vulnerability affecting the wu-ftp server software, specifically when FTP conversion is enabled. The vulnerability arises because wu-ftp processes certain file names through external conversion programs such as tar or uncompress. An attacker can craft a malformed file name that is interpreted as a command-line argument to these conversion utilities. This improper handling allows the attacker to execute arbitrary commands on the server without authentication. The affected product is 'anonftp' by millenux_gmbh, with vulnerable versions including 2.4.2, 2.5.0, 2.6.0, 2.8.1, 5.2, 6.0, and 6.1. The vulnerability was published in December 1999 and has a CVSS v2 score of 7.5, indicating high severity. The vector metrics show that the attack can be performed remotely (AV:N), with low attack complexity (AC:L), no authentication required (Au:N), and impacts confidentiality, integrity, and availability (C:P/I:P/A:P). No patches are available, and no known exploits have been reported in the wild, likely due to the age of the software and its declining usage. The core issue is the unsafe passing of user-controlled input (file names) to system commands without proper sanitization, leading to command injection. This vulnerability is critical in environments where wu-ftp with conversion is still in use, as it allows remote attackers to gain control over the server, potentially leading to data theft, system compromise, or denial of service.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on whether wu-ftp servers with FTP conversion enabled are still operational within their infrastructure. Given the age of the vulnerability and the obsolescence of wu-ftp in modern environments, the direct impact may be limited. However, legacy systems in critical sectors such as manufacturing, utilities, or government agencies might still run vulnerable versions, especially in environments with long system lifecycles. Exploitation could lead to unauthorized command execution, resulting in data breaches, system manipulation, or service disruption. This could compromise sensitive information, disrupt business operations, and damage organizational reputation. Additionally, if exploited within critical infrastructure or governmental networks, the consequences could extend to national security or public safety. The lack of available patches means organizations must rely on mitigation or replacement strategies. The vulnerability’s remote and unauthenticated nature increases risk, as attackers do not need prior access or credentials to exploit it.

Mitigation Recommendations

Immediately identify and inventory any wu-ftp servers in use, particularly those with FTP conversion enabled. Disable FTP conversion features if disabling is possible without impacting business processes, as this is the root cause of the vulnerability. If wu-ftp is still required, isolate the FTP servers within segmented network zones with strict firewall rules to limit exposure to untrusted networks. Replace wu-ftp with modern, actively maintained FTP server software that does not have this vulnerability and supports secure protocols such as FTPS or SFTP. Implement strict input validation and sanitization on any file names or user inputs processed by server-side utilities to prevent command injection. Monitor network traffic and system logs for unusual FTP activity or unexpected command executions that could indicate exploitation attempts. Apply host-based intrusion detection systems (HIDS) to detect anomalous behavior on FTP servers. Develop and enforce a decommissioning plan for legacy systems running outdated software to reduce attack surface. Educate system administrators about the risks of legacy FTP servers and the importance of timely upgrades and secure configurations.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df51a

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/25/2025, 6:13:48 PM

Last updated: 7/28/2025, 12:15:35 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats