7.5
CVSSv2

CVE-2005-2961

Published: 05/10/2005 Updated: 11/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the get_string_ahref function for ProZilla 1.3.7.4 and possibly earlier, with the -ftpsearch option enabled, allows remote servers to execute arbitrary code via a search response with a crafted string in the HREF field of an <A> tag.

Vulnerable Product Search on Vulmon Subscribe to Product

prozilla prozilla download accelerator 1.3.7.4

Vendor Advisories

Tavis Ormandy discovered a buffer overflow in prozilla, a multi-threaded download accelerator, which may be exploited to execute arbitrary code For the old stable distribution (woody) this problem has been fixed in version 136-3woody3 The stable distribution (sarge) does not contain prozilla packages The unstable distribution (sid) does not co ...

Exploits

#include &lt;stdioh&gt; #include &lt;stringh&gt; #include &lt;stdlibh&gt; #define OVERFLOW (1&lt;&lt;10)+32 #define SLEDSIZ (1&lt;&lt;10) #define RETADDR 0x806977a+SLEDSIZ/2 #define OUTPUT "AdvResultsasp" /* * prozilla bug, found while auditing for gentoo bug #70090 * -taviso@gentooorg */ /* execve() /bin/id */ unsigned char shellcode[] = ...