Vulnerability Details : CVE-2005-3150
Format string vulnerability in the Log_Flush function in Weex 2.6.1.5, 2.6.1, and possibly other versions allows remote FTP servers to execute arbitrary code via format strings in filenames.
Vulnerability category: Execute code
Products affected by CVE-2005-3150
- cpe:2.3:a:weex:weex:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:weex:weex:2.6.1.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-3150
1.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 77 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-3150
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2005-3150
-
http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/86833
86833 – maintainer-update: ftp/weex - fixing a remote format string bugPatch;Vendor Advisory
-
http://www.securityfocus.com/bid/14999
-
http://secunia.com/advisories/17028
About Secunia Research | FlexeraVendor Advisory
-
http://www.gentoo.org/security/en/glsa/glsa-200510-09.xml
Weex: Format string vulnerability (GLSA 200510-09) — Gentoo securityPatch;Vendor Advisory
-
http://secunia.com/advisories/17112
About Secunia Research | Flexera
-
http://secunia.com/advisories/17081
About Secunia Research | Flexera
-
http://www.debian.org/security/2005/dsa-855
[SECURITY] [DSA 855-1] New weex packages fix arbitrary code executionPatch;Vendor Advisory
Jump to