Skip to main content

CVE-1999-1003: War FTP Daemon 1.70 allows remote attackers to cause a denial of service by flooding it with connect

Medium
VulnerabilityCVE-1999-1003cve-1999-1003denial of service
Published: Mon Dec 13 1999 (12/13/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: jgaa
Product: warftpd

Description

War FTP Daemon 1.70 allows remote attackers to cause a denial of service by flooding it with connections.

AI-Powered Analysis

AILast updated: 07/01/2025, 12:55:53 UTC

Technical Analysis

CVE-1999-1003 is a vulnerability found in War FTP Daemon version 1.70, a widely used FTP server software from the late 1990s. This vulnerability allows remote attackers to cause a denial of service (DoS) condition by flooding the server with a high volume of connection attempts. Specifically, the flaw arises because the server does not adequately handle excessive connection requests, leading to resource exhaustion such as CPU, memory, or network socket depletion. As a result, legitimate users are unable to establish FTP sessions, effectively disrupting the availability of the FTP service. The vulnerability does not impact confidentiality or integrity, as it solely affects availability. The CVSS score of 5.0 (medium severity) reflects that the attack vector is network-based, requires no authentication, and has low attack complexity, but only impacts availability without compromising data or system integrity. No patches are available for this version, and there are no known exploits in the wild, likely due to the age of the software and its declining usage. However, systems still running War FTP Daemon 1.70 remain vulnerable to DoS attacks if exposed to untrusted networks.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential disruption of FTP services that may be critical for file transfers, backups, or legacy system integrations. While FTP usage has declined in favor of more secure protocols, some industrial, governmental, or legacy systems in Europe might still rely on War FTP Daemon 1.70. A successful DoS attack could halt business operations dependent on FTP, causing operational delays and potential financial losses. Additionally, disruption of FTP services in sectors such as manufacturing, logistics, or public administration could affect supply chains or citizen services. Although the vulnerability does not lead to data breaches, the loss of availability can degrade trust and service reliability. European organizations with exposed FTP servers running this outdated software are at risk, especially if they lack network-level protections or monitoring.

Mitigation Recommendations

Given that no patch is available for War FTP Daemon 1.70, European organizations should prioritize the following mitigations: 1) Immediate replacement or upgrade of War FTP Daemon to a supported, patched FTP server version or migrate to more secure file transfer protocols such as SFTP or FTPS. 2) Restrict network access to FTP servers by implementing firewall rules that limit connections to trusted IP addresses and networks only. 3) Deploy network-level rate limiting or connection throttling to prevent flooding attacks from overwhelming the FTP service. 4) Monitor FTP server logs and network traffic for unusual spikes in connection attempts indicative of DoS attempts. 5) Consider isolating legacy FTP servers in segmented network zones with strict access controls to minimize exposure. 6) If migration is not immediately feasible, use intrusion prevention systems (IPS) or denial-of-service mitigation appliances to detect and block flooding traffic targeting FTP services.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df4ef

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 12:55:53 PM

Last updated: 8/14/2025, 1:14:03 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats