Vulnerability Description
Multiple buffer overflows in WinEggDropShell remote access trojan (RAT) 1.7 allow remote attackers to execute arbitrary code via (1) a long GET request to the HTTP server, or a long (2) USER or (3) PASS command to the FTP server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wineggdropshell | Wineggdropshell | 1.7 |
References
- http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0059.htmlExploitVendor Advisory
- http://securityreason.com/securityalert/226
- http://secway.org/advisory/AD20051202.txtVendor Advisory
- http://www.securityfocus.com/archive/1/418398ExploitVendor Advisory
- http://www.securityfocus.com/bid/15682Exploit
- http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0059.htmlExploitVendor Advisory
- http://securityreason.com/securityalert/226
- http://secway.org/advisory/AD20051202.txtVendor Advisory
- http://www.securityfocus.com/archive/1/418398ExploitVendor Advisory
- http://www.securityfocus.com/bid/15682Exploit
FAQ
What is CVE-2005-3992?
CVE-2005-3992 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple buffer overflows in WinEggDropShell remote access trojan (RAT) 1.7 allow remote attackers to execute arbitrary code via (1) a long GET request to the HTTP server, or a long (2) USER or (3) PA...
How severe is CVE-2005-3992?
CVE-2005-3992 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-3992?
Check the references section above for vendor advisories and patch information. Affected products include: Wineggdropshell Wineggdropshell.