Vulnerability Name: | CVE-2004-1376 (CCN-18723) | ||||||||
Assigned: | 2004-12-30 | ||||||||
Published: | 2004-12-30 | ||||||||
Updated: | 2021-07-23 | ||||||||
Summary: | Directory traversal vulnerability in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious FTP servers to overwrite arbitrary files via .. (dot dot) sequences in filenames returned from a LIST command. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Thu Dec 30 2004 - 08:56:41 CST 7a69Adv#17 - Internet Explorer FTP download path disclosure Source: MITRE Type: CNA CVE-2004-1376 Source: MITRE Type: CNA CVE-2005-2126 Source: BUGTRAQ Type: UNKNOWN 20041230 7a69Adv#17 - Internet Explorer FTP download path disclosure Source: CCN Type: SA13704 Internet Explorer FTP Download Directory Traversal Source: SECUNIA Type: Patch, Vendor Advisory 13704 Source: CCN Type: SA17163 Microsoft Windows FTP Client Filename Validation Vulnerability Source: CCN Type: SA17172 Avaya Various Products Multiple Vulnerabilities Source: CCN Type: SA17223 Nortel Centrex IP Client Manager Multiple Vulnerabilities Source: CCN Type: SECTRACK ID: 1015036 Microsoft Windows FTP Client Input Validation Hole Lets Remote Servers Create/Overwrite Files on the Target User`s System Source: MISC Type: Exploit, Vendor Advisory http://www.7a69ezine.org/node/view/176 Source: CCN Type: US-CERT VU#415828 Microsoft Windows FTP client does not properly validate received file names Source: CCN Type: Microsoft Security Bulletin MS05-044 Vulnerability in the Windows FTP Client Could Allow File Transfer Location Tampering (905495) Source: CCN Type: OSVDB ID: 12698 Microsoft IE FTP Download Traversal Arbitrary Command Execution Source: XF Type: UNKNOWN ie-ftp-create-files(18723) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |