Unspecified vulnerability in XLink Omni-NFS Enterprise allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by vd_xlink2.pm, an "Omni-NFS Enterprise remote exploit." NOTE: this is probably a different vulnerability than CVE-2006-5780. As of 20061107, this disclosure has no actionable information. However, since it is from a reliable researcher, it is being assigned a CVE identifier for tracking purposes.
Published 2006-11-07 23:07:00
Updated 2017-07-20 01:33:59
Source MITRE
View at NVD,   CVE.org
Vulnerability category: Execute code

Products affected by CVE-2006-5792

Exploit prediction scoring system (EPSS) score for CVE-2006-5792

90.02%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2006-5792

  • Xlink FTP Server Buffer Overflow
    Disclosure Date: 2009-10-03
    First seen: 2020-04-26
    exploit/windows/ftp/xlink_server
    This module exploits a stack buffer overflow in Xlink FTP Server that comes bundled with Omni-NFS Enterprise 5.2. When a overly long FTP request is sent to the server, arbitrary code may be executed. Authors: - MC <mc@metasploit.com>
  • Xlink FTP Client Buffer Overflow
    Disclosure Date: 2009-10-03
    First seen: 2020-04-26
    exploit/windows/ftp/xlink_client
    This module exploits a stack buffer overflow in Xlink FTP Client 32 Version 3.01 that comes bundled with Omni-NFS Enterprise 5.2. When an overly long FTP server response is received by a client, arbitrary code may be executed. Authors: - MC <mc@metasploit.

CVSS scores for CVE-2006-5792

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
7.5
HIGH AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
NIST
Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!