Multiple buffer overflows in WinEggDropShell remote access trojan (RAT) 1.7 allow remote attackers to execute arbitrary code via (1) a long GET request to the HTTP server, or a long (2) USER or (3) PASS command to the FTP server.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0059.html | Exploit Vendor Advisory |
http://securityreason.com/securityalert/226 | |
http://secway.org/advisory/AD20051202.txt | Vendor Advisory |
http://www.securityfocus.com/archive/1/418398 | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/15682 | Exploit |
Configurations
History
No history.
Information
Published : 2005-12-04 23:03
Updated : 2008-09-05 20:55
NVD link : CVE-2005-3992
Mitre link : CVE-2005-3992
CVE.ORG link : CVE-2005-3992
JSON object : View
Products Affected
wineggdropshell
- wineggdropshell
CWE