Multiple buffer overflows in WinEggDropShell remote access trojan (RAT) 1.7 allow remote attackers to execute arbitrary code via (1) a long GET request to the HTTP server, or a long (2) USER or (3) PASS command to the FTP server.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/418398 | Exploit Vendor Advisory |
http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0059.html | Exploit Vendor Advisory |
http://secway.org/advisory/AD20051202.txt | Vendor Advisory |
http://www.securityfocus.com/bid/15682 | Exploit |
http://securityreason.com/securityalert/226 |
Configurations
Information
Published : 2005-12-04 15:03
Updated : 2008-09-05 13:55
NVD link : CVE-2005-3992
Mitre link : CVE-2005-3992
JSON object : View
CWE
Products Affected
wineggdropshell
- wineggdropshell