10
CVSSv2

CVE-2005-3524

Published: 07/11/2005 Updated: 11/07/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the SSL-ready version of linux-ftpd (linux-ftpd-ssl) 0.17 allows remote malicious users to execute arbitrary code by creating a long directory name, then executing the XPWD command.

Vulnerable Product Search on Vulmon Subscribe to Product

linux-ftpd-ssl linux-ftpd-ssl 0.17

Vendor Advisories

Debian Bug report logs - #339074 linux-ftpd-ssl: Remotely exploitable buffer overflow Package: linux-ftpd-ssl; Maintainer for linux-ftpd-ssl is Mats Erik Andersson <matsandersson@gisladiskerse>; Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Mon, 14 Nov 2005 20:33:06 UTC Severity: grave Tags: security Fixe ...
A buffer overflow has been discovered in ftpd-ssl, a simple BSD FTP server with SSL encryption support, that could lead to the execution of arbitrary code The old stable distribution (woody) does not contain linux-ftpd-ssl packages For the stable distribution (sarge) this problem has been fixed in version 01718+03-3sarge1 For the unstable dis ...

Exploits

/*Oct2005 VER2*/ /**********************************************************/ /** lnxFTPDssl_warezc **/ /** linux-ftpd-ssl 017 remote r00t exploit by kcope **/ /** for all of those who installed the ssl ready version **/ /** of linux-ftpd to be more "secure" **/ /** ...