Vulnerability Description
Stack-based buffer overflow in Mike Dubman Windows RSH daemon (rshd) 1.7 allows remote attackers to execute arbitrary code via a long string to the shell port (514/tcp). NOTE: this might overlap CVE-2007-4006.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mike Dubman | Windows Rsh Daemon | 1.7 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/26197Vendor Advisory
- http://www.securityfocus.com/bid/25044Exploit
- http://www.securitytracker.com/id?1018459
- https://www.exploit-db.com/exploits/4222
- http://secunia.com/advisories/26197Vendor Advisory
- http://www.securityfocus.com/bid/25044Exploit
- http://www.securitytracker.com/id?1018459
- https://www.exploit-db.com/exploits/4222
FAQ
What is CVE-2007-4005?
CVE-2007-4005 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Stack-based buffer overflow in Mike Dubman Windows RSH daemon (rshd) 1.7 allows remote attackers to execute arbitrary code via a long string to the shell port (514/tcp). NOTE: this might overlap CVE-...
How severe is CVE-2007-4005?
CVE-2007-4005 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-4005?
Check the references section above for vendor advisories and patch information. Affected products include: Mike Dubman Windows Rsh Daemon.