Vulnerabilities > CVE-2005-0277 - Remote vulnerability in 3Com 3Cdaemon 2.0
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
Buffer overflow in the FTP service in 3Com 3CDaemon 2.0 revision 10 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via (1) a long username in the USER command or (2) an FTP command that contains a long argument, such as cd, send, or ls.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description 3Com 3CDaemon FTP Unauthorized "USER" Remote BoF Exploit. CVE-2005-0277. Remote exploit for windows platform id EDB-ID:827 last seen 2016-01-31 modified 2005-02-18 published 2005-02-18 reporter class101 source https://www.exploit-db.com/download/827/ title 3Com 3CDaemon FTP Unauthorized "USER" Remote BoF Exploit description 3Com 3CDaemon 2.0 FTP Username Overflow. CVE-2005-0277. Remote exploit for windows platform id EDB-ID:16730 last seen 2016-02-02 modified 2010-09-20 published 2010-09-20 reporter metasploit source https://www.exploit-db.com/download/16730/ title 3Com 3CDaemon 2.0 FTP Username Overflow description 3Com Ftp Server 2.0 Remote Overflow Exploit. CVE-2005-0277. Remote exploit for windows platform id EDB-ID:825 last seen 2016-01-31 modified 2005-02-17 published 2005-02-17 reporter c0d3r source https://www.exploit-db.com/download/825/ title 3Com Ftp Server 2.0 - Remote Overflow Exploit
Metasploit
description | This module exploits a vulnerability in the 3Com 3CDaemon FTP service. This package is being distributed from the 3Com web site and is recommended in numerous support documents. This module uses the USER command to trigger the overflow. |
id | MSF:EXPLOIT/WINDOWS/FTP/3CDAEMON_FTP_USER |
last seen | 2020-05-23 |
modified | 2017-07-24 |
published | 2005-11-26 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0277 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/ftp/3cdaemon_ftp_user.rb |
title | 3Com 3CDaemon 2.0 FTP Username Overflow |
Nessus
NASL family | FTP |
NASL id | 3COM_3CSERVER_FTP_OVERFLOW.NASL |
description | The remote host is running the 3Com 3CServer or 3CDaemon FTP server. According to its banner, the version of the 3CServer / 3CDaemon FTP server on the remote host is reportedly affected by multiple buffer overflow and format string vulnerabilities as well as an information leak issue. An attacker may be able to exploit these flaws to execute arbitrary code on the remote host with the privileges of the FTP server, generally Administrator. |
last seen | 2020-04-09 |
modified | 2005-02-08 |
plugin id | 16321 |
published | 2005-02-08 |
reporter | This script is Copyright (C) 2005-2020 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/16321 |
title | 3Com 3CServer/3CDaemon FTP Server Multiple Vulnerabilities (OF, FS, PD, DoS) |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/83100/3cdaemon_ftp_user.rb.txt |
id | PACKETSTORM:83100 |
last seen | 2016-12-05 |
published | 2009-11-26 |
reporter | H D Moore |
source | https://packetstormsecurity.com/files/83100/3Com-3CDaemon-2.0-FTP-Username-Overflow.html |
title | 3Com 3CDaemon 2.0 FTP Username Overflow |