Vulnerability Details : CVE-2007-4006
Public exploit exists!
Buffer overflow in Mike Dubman Windows RSH daemon (rshd) 1.7 has unknown impact and remote attack vectors, aka ZD-00000034. NOTE: this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release actionable advisories. A CVE has been assigned for tracking purposes, but duplicates with other CVEs are difficult to determine.
Vulnerability category: Overflow
Products affected by CVE-2007-4006
- cpe:2.3:a:mike_dubman:windows_rsh_daemon:1.7:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-4006
93.87%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2007-4006
-
Windows RSH Daemon Buffer Overflow
Disclosure Date: 2007-07-24First seen: 2020-04-26exploit/windows/misc/windows_rshThis module exploits a vulnerability in Windows RSH daemon 1.8. The vulnerability is due to a failure to check for the length of input sent to the RSH server. A CPORT of 512 -> 1023 must be configured for the exploit to be successful. Authors: - MC <mc@met
CVSS scores for CVE-2007-4006
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
References for CVE-2007-4006
Jump to