CVE-2005-3992

Multiple buffer overflows in WinEggDropShell remote access trojan (RAT) 1.7 allow remote attackers to execute arbitrary code via (1) a long GET request to the HTTP server, or a long (2) USER or (3) PASS command to the FTP server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wineggdropshell:wineggdropshell:1.7:*:*:*:*:*:*:*

History

21 Nov 2024, 00:03

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0059.html - Exploit, Vendor Advisory () http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0059.html - Exploit, Vendor Advisory
References () http://securityreason.com/securityalert/226 - () http://securityreason.com/securityalert/226 -
References () http://secway.org/advisory/AD20051202.txt - Vendor Advisory () http://secway.org/advisory/AD20051202.txt - Vendor Advisory
References () http://www.securityfocus.com/archive/1/418398 - Exploit, Vendor Advisory () http://www.securityfocus.com/archive/1/418398 - Exploit, Vendor Advisory
References () http://www.securityfocus.com/bid/15682 - Exploit () http://www.securityfocus.com/bid/15682 - Exploit

Information

Published : 2005-12-04 23:03

Updated : 2025-04-03 01:03


NVD link : CVE-2005-3992

Mitre link : CVE-2005-3992

CVE.ORG link : CVE-2005-3992


JSON object : View

Products Affected

wineggdropshell

  • wineggdropshell