CVE-2005-2841 : Detail

CVE-2005-2841

92.1%V3
Network
2005-09-08
02h00 +00:00
2017-10-09
22h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Buffer overflow in Firewall Authentication Proxy for FTP and/or Telnet Sessions for Cisco IOS 12.2ZH and 12.2ZL, 12.3 and 12.3T, and 12.4 and 12.4T allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted user authentication credentials.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 26233

Publication date : 2005-09-06
22h00 +00:00
Author : Markus
EDB Verified : Yes

source: https://www.securityfocus.com/bid/14770/info Cisco IOS Firewall Authentication Proxy is prone to a buffer overflow condition. Successful exploitation of this issue could cause a denial of service or potential execution of arbitrary code. This issue affects the FTP and Telnet protocols, but not HTTP. perl -e 'print "pass "; print "A" x 51; print "@ \n";'

Products Mentioned

Configuraton 0

Cisco>>Ios >> Version 12.2zh

Cisco>>Ios >> Version 12.2zl

Cisco>>Ios >> Version 12.3

Cisco>>Ios >> Version 12.3t

Cisco>>Ios >> Version 12.4

Cisco>>Ios >> Version 12.4t

References

http://www.kb.cert.org/vuls/id/236045
Tags : third-party-advisory, x_refsource_CERT-VN
http://www.vupen.com/english/advisories/2005/1669
Tags : vdb-entry, x_refsource_VUPEN