BolinTech Dream FTP服务器用户名格式化字符串漏洞

漏洞信息详情

BolinTech Dream FTP服务器用户名格式化字符串漏洞

漏洞简介

Dream FTP 1.02存在格式化字符串漏洞。远程攻击者可以借助username中的格式化字符串说明符导致服务拒绝(崩溃),以及可能执行任意代码。

漏洞公告

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源: XF
名称: dreamftp-username-format-string(15070)
链接:http://xforce.iss.net/xforce/xfdb/15070

来源: BID
名称: 9600
链接:http://www.securityfocus.com/bid/9600

来源: www.security-protocols.com
链接:http://www.security-protocols.com/modules.php?name=News&file=article&sid=1722

来源: BUGTRAQ
名称: 20040211 Re: [Full-Disclosure] DreamFTP Server 1.02 Buffer Overflow
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=107656166402882&w=2

来源: FULLDISC
名称: 20040207 DreamFTP Server 1.02 Buffer Overflow
链接:http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/016871.html

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享