Vulnerability Description
Stack-based buffer overflow in RabidHamster R2/Extreme 1.65 and earlier allows remote authenticated users to execute arbitrary code via a long string to TCP port 23.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rabidhamster | R2\/Extreme | <= 1.65 |
Related Weaknesses (CWE)
References
- http://aluigi.org/adv/r2_1-adv.txtExploit
- http://osvdb.org/79093
- http://secunia.com/advisories/47966Vendor Advisory
- http://www.securityfocus.com/bid/52061
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73113
- http://aluigi.org/adv/r2_1-adv.txtExploit
- http://osvdb.org/79093
- http://secunia.com/advisories/47966Vendor Advisory
- http://www.securityfocus.com/bid/52061
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73113
FAQ
What is CVE-2012-1222?
CVE-2012-1222 is a vulnerability with a CVSS score of 8.5 (HIGH). Stack-based buffer overflow in RabidHamster R2/Extreme 1.65 and earlier allows remote authenticated users to execute arbitrary code via a long string to TCP port 23.
How severe is CVE-2012-1222?
CVE-2012-1222 has been rated HIGH with a CVSS base score of 8.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-1222?
Check the references section above for vendor advisories and patch information. Affected products include: Rabidhamster R2\/Extreme.