Vulnerability Name: | CVE-2014-0603 (CCN-95183) | ||||||||
Assigned: | 2013-12-28 | ||||||||
Published: | 2014-08-01 | ||||||||
Updated: | 2015-02-09 | ||||||||
Summary: | The rftpcom.dll ActiveX control in Attachmate Reflection FTP Client before 14.1.429 allows remote attackers to cause a denial of service (memory corruption) and execute arbitrary code via vectors related to the (1) GetGlobalSettings or (2) GetSiteProperties3 methods, which triggers a dereference of an arbitrary memory address. Note: this issue was MERGED with CVE-2014-0606 because it is the same type of vulnerability, affecting the same set of versions, and discovered by the same researcher. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-94 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2014-0603 Source: CONFIRM Type: Vendor Advisory http://support.attachmate.com/techdocs/2501.html Source: CCN Type: Attachmate Technical Note 2546 Security Updates and INFOConnect Source: CCN Type: BID-69151 Attachmate Reflection FTP Client ActiveX Control CVE-2014-0603 Remote Code Execution Vulnerability Source: MISC Type: UNKNOWN http://www.zerodayinitiative.com/advisories/ZDI-14-288/ Source: MISC Type: UNKNOWN http://www.zerodayinitiative.com/advisories/ZDI-14-291/ Source: XF Type: UNKNOWN reflection-cve20140603-code-exec(95183) Source: CCN Type: ZDI-14-288 Attachmate Reflection Secure FTP Client rftpcom.dll Multiple Memory Corruption Remote Code Execution Vulnerabilities | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
BACK |