[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2006-0705

Date: (C)2006-02-15   (M)2017-07-21
 
CVSS Score: 6.5Access Vector: NETWORK
Exploitability Subscore: 8.0Access Complexity: LOW
Impact Subscore: 6.4Authentication: SINGLE_INSTANCE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











Format string vulnerability in a logging function as used by various SFTP servers, including (1) AttachmateWRQ Reflection for Secure IT UNIX Server before 6.0.0.9, (2) Reflection for Secure IT Windows Server before 6.0 build 38, (3) F-Secure SSH Server for Windows before 5.3 build 35, (4) F-Secure SSH Server for UNIX 3.0 through 5.0.8, (5) SSH Tectia Server 4.3.6 and earlier and 4.4.0, and (6) SSH Shell Server 3.2.9 and earlier, allows remote authenticated users to execute arbitrary commands via unspecified vectors, involving crafted filenames and the stat command.

Reference:
SECTRACK-1015619
BID-16625
BID-16640
SECUNIA-18828
SECUNIA-18843
SECUNIA-24516
SECUNIA-29552
ADV-2006-0554
ADV-2006-0555
ADV-2008-1008
GLSA-200703-13
HPSBTU02322
SSRT080011
VU#419241
http://support.wrq.com/techdocs/1882.html
sftp-logging-format-string(24651)

CWE    1
CWE-134

© 2013 SecPod Technologies