Format string vulnerability in the Log_Flush function in Weex 2.6.1.5, 2.6.1, and possibly other versions allows remote FTP servers to execute arbitrary code via format strings in filenames.
References
Link | Resource |
---|---|
http://secunia.com/advisories/17028 | Vendor Advisory |
http://secunia.com/advisories/17081 | |
http://secunia.com/advisories/17112 | |
http://www.debian.org/security/2005/dsa-855 | Patch Vendor Advisory |
http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/86833 | Patch Vendor Advisory |
http://www.gentoo.org/security/en/glsa/glsa-200510-09.xml | Patch Vendor Advisory |
http://www.securityfocus.com/bid/14999 | |
http://secunia.com/advisories/17028 | Vendor Advisory |
http://secunia.com/advisories/17081 | |
http://secunia.com/advisories/17112 | |
http://www.debian.org/security/2005/dsa-855 | Patch Vendor Advisory |
http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/86833 | Patch Vendor Advisory |
http://www.gentoo.org/security/en/glsa/glsa-200510-09.xml | Patch Vendor Advisory |
http://www.securityfocus.com/bid/14999 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/17028 - Vendor Advisory | |
References | () http://secunia.com/advisories/17081 - | |
References | () http://secunia.com/advisories/17112 - | |
References | () http://www.debian.org/security/2005/dsa-855 - Patch, Vendor Advisory | |
References | () http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/86833 - Patch, Vendor Advisory | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200510-09.xml - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/14999 - |
Information
Published : 2005-10-05 22:02
Updated : 2024-11-21 00:01
NVD link : CVE-2005-3150
Mitre link : CVE-2005-3150
CVE.ORG link : CVE-2005-3150
JSON object : View
Products Affected
weex
- weex
CWE