| Vulnerability Name: | CVE-2005-3524 (CCN-23016) | ||||||||
| Assigned: | 2005-11-06 | ||||||||
| Published: | 2005-11-06 | ||||||||
| Updated: | 2017-07-11 | ||||||||
| Summary: | Buffer overflow in the SSL-ready version of linux-ftpd (linux-ftpd-ssl) 0.17 allows remote attackers to execute arbitrary code by creating a long directory name, then executing the XPWD command. | ||||||||
| CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
| CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: MITRE Type: CNA CVE-2005-3524 Source: CCN Type: Linux-ftpd-ssl Web site freshmeat.net: Project details for linux-ftpd-ssl Source: FULLDISC Type: Exploit 20051105 linux-ftpd-ssl 0.17 warez Source: CCN Type: SA17465 Linux-ftpd-ssl FTP Server Response Buffer Overflow Vulnerability Source: SECUNIA Type: UNKNOWN 17465 Source: SECUNIA Type: UNKNOWN 17529 Source: SECUNIA Type: UNKNOWN 17586 Source: DEBIAN Type: UNKNOWN DSA-896 Source: DEBIAN Type: DSA-896 linux-ftpd-ssl -- buffer overflow Source: CCN Type: GLSA-200511-11 linux-ftpd-ssl: Remote buffer overflow Source: OSVDB Type: UNKNOWN 20530 Source: CCN Type: OSVDB ID: 20530 Linux-ftpd-ssl FTP Server Response Remote Overflow Source: BID Type: UNKNOWN 15343 Source: CCN Type: BID-15343 Linux-FTPD-SSL FTP Server Remote Buffer Overflow Vulnerability Source: VUPEN Type: UNKNOWN ADV-2005-2330 Source: XF Type: UNKNOWN Linux-ftpd-ssl-vsprintf-bo(23016) Source: XF Type: UNKNOWN Linux-ftpd-ssl-vsprintf-bo(23016) | ||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
| Oval Definitions | |||||||||
| |||||||||
| BACK | |||||||||