CVE-2007-4005

Stack-based buffer overflow in Mike Dubman Windows RSH daemon (rshd) 1.7 allows remote attackers to execute arbitrary code via a long string to the shell port (514/tcp). NOTE: this might overlap CVE-2007-4006.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mike_dubman:windows_rsh_daemon:1.7:*:*:*:*:*:*:*

History

21 Nov 2024, 00:34

Type Values Removed Values Added
References () http://secunia.com/advisories/26197 - Vendor Advisory () http://secunia.com/advisories/26197 - Vendor Advisory
References () http://www.securityfocus.com/bid/25044 - Exploit () http://www.securityfocus.com/bid/25044 - Exploit
References () http://www.securitytracker.com/id?1018459 - () http://www.securitytracker.com/id?1018459 -
References () https://www.exploit-db.com/exploits/4222 - () https://www.exploit-db.com/exploits/4222 -

Information

Published : 2007-07-26 00:30

Updated : 2024-11-21 00:34


NVD link : CVE-2007-4005

Mitre link : CVE-2007-4005

CVE.ORG link : CVE-2007-4005


JSON object : View

Products Affected

mike_dubman

  • windows_rsh_daemon
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer