7.5
CVSSv2

CVE-2006-2961

Published: 12/06/2006 Updated: 20/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 765
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in CesarFTP 0.99g and previous versions allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a long MKD command. NOTE: the provenance of this information is unknown; the details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

aclogic cesarftp

Exploits

## # $Id: cesarftp_mkdrb 11799 2011-02-23 00:58:54Z mc $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metas ...
#!/usr/bin/env python #-*- coding:utf-8 -*- # Exploit Title : CesarFTP 099g -(XCWD)Remote BoF Exploit # Discovery by : Irving Aguilar # Email : imaguilar@protonmailch # Discovery Date : 18012016 # Tested Version : 099g # Vulnerability Type : Denial of Service (DoS) # Tested on OS : Windows XP Professional SP3 x86 ...
#!/usr/bin/python #CesarFtp 099g 0day Exploit #Proof of Concept: execute calcexe #Tested on XP sp2 polish #Bug found by h07 [h07@interiapl] #Date: 10062006 from socket import * shellcode = ( #execute calcexe <metasploitcom> "\x31\xc9\x83\xe9\xdb\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\xd8" "\x22\x72\xe4\x83\xeb\xfc\xe2\xf4\x24\xca\x3 ...