Buffer overflow in LeapFTP allows remote attackers to execute arbitrary code via a long Host string in a Site Queue (.lsq) file.
References
| Link | Resource |
|---|---|
| http://marc.info/?l=bugtraq&m=112491089723070&w=2 | |
| http://secunia.com/advisories/16552/ | Patch Vendor Advisory |
| http://securitytracker.com/id?1014785 | |
| http://secway.org/advisory/AD20050824.txt | Exploit Patch Vendor Advisory |
| http://www.leapware.com/security/2005082301.txt | Exploit Patch Vendor Advisory |
| http://www.securityfocus.com/bid/14655 | Exploit Patch |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/21974 | |
| http://marc.info/?l=bugtraq&m=112491089723070&w=2 | |
| http://secunia.com/advisories/16552/ | Patch Vendor Advisory |
| http://securitytracker.com/id?1014785 | |
| http://secway.org/advisory/AD20050824.txt | Exploit Patch Vendor Advisory |
| http://www.leapware.com/security/2005082301.txt | Exploit Patch Vendor Advisory |
| http://www.securityfocus.com/bid/14655 | Exploit Patch |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/21974 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:00
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://marc.info/?l=bugtraq&m=112491089723070&w=2 - | |
| References | () http://secunia.com/advisories/16552/ - Patch, Vendor Advisory | |
| References | () http://securitytracker.com/id?1014785 - | |
| References | () http://secway.org/advisory/AD20050824.txt - Exploit, Patch, Vendor Advisory | |
| References | () http://www.leapware.com/security/2005082301.txt - Exploit, Patch, Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/14655 - Exploit, Patch | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/21974 - |
Information
Published : 2005-09-02 23:03
Updated : 2025-04-03 01:03
NVD link : CVE-2005-2767
Mitre link : CVE-2005-2767
CVE.ORG link : CVE-2005-2767
JSON object : View
Products Affected
leapware
- leapftp
CWE
