Vulnerabilities > CVE-2004-2074 - Unspecified vulnerability in Bolintech Dream FTP Server 1.02
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Format string vulnerability in Dream FTP 1.02 allows local users to cause a denial of service (crash) via format string specifiers in the (1) PASS or (2) RETR commands.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description BolinTech Dream FTP Server 1.02 Format String. CVE-2004-2074. Remote exploit for windows platform id EDB-ID:16712 last seen 2016-02-02 modified 2010-06-22 published 2010-06-22 reporter metasploit source https://www.exploit-db.com/download/16712/ title BolinTech Dream FTP Server 1.02 Format String description Dream FTP 1.2 Remote Format String Exploit. CVE-2004-2074. Remote exploit for windows platform id EDB-ID:823 last seen 2016-01-31 modified 2004-02-11 published 2004-02-11 reporter Skylined source https://www.exploit-db.com/download/823/ title Dream FTP 1.2 - Remote Format String Exploit
Metasploit
description | This module exploits a format string overflow in the BolinTech Dream FTP Server version 1.02. Based on the exploit by SkyLined. |
id | MSF:EXPLOIT/WINDOWS/FTP/DREAMFTP_FORMAT |
last seen | 2020-01-12 |
modified | 2017-11-08 |
published | 2007-09-09 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2074 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/ftp/dreamftp_format.rb |
title | BolinTech Dream FTP Server 1.02 Format String |
Nessus
NASL family | FTP |
NASL id | DREAMFTP_FORMAT_STRING.NASL |
description | The remote DreamFTP server is vulnerable to a format string attack when processing the USER command. An attacker may exploit this flaw to gain a shell on this host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 12086 |
published | 2004-03-04 |
reporter | This script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/12086 |
title | DreamFTP Server username Remote Format String |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/83174/dreamftp_format.rb.txt |
id | PACKETSTORM:83174 |
last seen | 2016-12-05 |
published | 2009-11-27 |
reporter | Patrick Webster |
source | https://packetstormsecurity.com/files/83174/BolinTech-Dream-FTP-Server-1.02-Format-String.html |
title | BolinTech Dream FTP Server 1.02 Format String |