[Forgot Password]
Login  Register Subscribe

24002

 
 

127027

 
 

102010

 
 

909

 
 

81374

 
 

133

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2006-0705Date: (C)2006-02-15   (M)2018-02-19


Format string vulnerability in a logging function as used by various SFTP servers, including (1) AttachmateWRQ Reflection for Secure IT UNIX Server before 6.0.0.9, (2) Reflection for Secure IT Windows Server before 6.0 build 38, (3) F-Secure SSH Server for Windows before 5.3 build 35, (4) F-Secure SSH Server for UNIX 3.0 through 5.0.8, (5) SSH Tectia Server 4.3.6 and earlier and 4.4.0, and (6) SSH Shell Server 3.2.9 and earlier, allows remote authenticated users to execute arbitrary commands via unspecified vectors, involving crafted filenames and the stat command.

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score  : CVSS Score  : 6.5
Exploit Score: Exploit Score: 8.0
Impact Score : Impact Score : 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: NETWORK
Attack Complexity: Access Complexity: LOW
Privileges Required: Authentication: SINGLE_INSTANCE
User Interaction: Confidentiality: PARTIAL
Scope: Integrity: PARTIAL
Confidentiality: Availability: PARTIAL
Integrity:  
Availability:  
  





Reference:
SECTRACK-1015619
BID-16625
BID-16640
SECUNIA-18828
SECUNIA-18843
SECUNIA-24516
SECUNIA-29552
ADV-2006-0554
ADV-2006-0555
ADV-2008-1008
GLSA-200703-13
HPSBTU02322
SSRT080011
VU#419241
http://support.wrq.com/techdocs/1882.html
sftp-logging-format-string(24651)

CWE    1
CWE-134

© 2013 SecPod Technologies