7.5
CVSSv2

CVE-2005-2841

Published: 08/09/2005 Updated: 11/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in Firewall Authentication Proxy for FTP and/or Telnet Sessions for Cisco IOS 12.2ZH and 12.2ZL, 12.3 and 12.3T, and 12.4 and 12.4T allows remote malicious users to cause a denial of service and possibly execute arbitrary code via crafted user authentication credentials.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

cisco ios 12.3t

cisco ios 12.4

cisco ios 12.2zh

cisco ios 12.2zl

cisco ios 12.3

cisco ios 12.4t

Vendor Advisories

The Cisco IOS Firewall Authentication Proxy for FTP and/or Telnet Sessions feature in specific versions of Cisco IOS software is vulnerable to a remotely-exploitable buffer overflow condition Devices that do not support, or are not configured for Firewall Authentication Proxy for FTP and/or Telnet Services are not affected Devices con ...

Exploits

source: wwwsecurityfocuscom/bid/14770/info Cisco IOS Firewall Authentication Proxy is prone to a buffer overflow condition Successful exploitation of this issue could cause a denial of service or potential execution of arbitrary code This issue affects the FTP and Telnet protocols, but not HTTP perl -e 'print "pass "; print "A" x 51 ...