Vulnerabilities > CVE-2005-2126 - Unspecified vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
The FTP client in Windows XP SP1 and Server 2003, and Internet Explorer 6 SP1 on Windows 2000 SP4, when "Enable Folder View for FTP Sites" is enabled and the user manually initiates a file transfer, allows user-assisted, remote FTP servers to overwrite files in arbitrary locations via crafted filenames.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
OS | 3 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS05-044.NASL |
description | The remote host contains a version of the Microsoft FTP client that contains a flaw in the way it handles FTP download. An attacker could exploit this flaw to modify the destination location for files downloaded via FTP. To exploit this flaw an attacker would need to set up a rogue FTP server and have a victim on the remote host connect to it and download a file manually using the affected client. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 19997 |
published | 2005-10-11 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/19997 |
title | MS05-044: Vulnerability in the Windows FTP Client Could Allow File Transfer Location Tampering (905495) |
Oval
accepted 2014-02-24T04:00:09.447-05:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name John Hoyland organization Centennial Software name Robert L. Hollis organization ThreatGuard, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc. name Maria Mikhno organization ALTX-SOFT
description The FTP client in Windows XP SP1 and Server 2003, and Internet Explorer 6 SP1 on Windows 2000 SP4, when "Enable Folder View for FTP Sites" is enabled and the user manually initiates a file transfer, allows user-assisted, remote FTP servers to overwrite files in arbitrary locations via crafted filenames. family windows id oval:org.mitre.oval:def:1146 status accepted submitted 2005-10-12T12:00:00.000-04:00 title FTP Download Destination Tampering Vulnerability (Windows 2000) version 72 accepted 2011-05-09T04:01:09.506-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Shane Shaffer organization G2, Inc.
description The FTP client in Windows XP SP1 and Server 2003, and Internet Explorer 6 SP1 on Windows 2000 SP4, when "Enable Folder View for FTP Sites" is enabled and the user manually initiates a file transfer, allows user-assisted, remote FTP servers to overwrite files in arbitrary locations via crafted filenames. family windows id oval:org.mitre.oval:def:1284 status accepted submitted 2005-10-12T12:00:00.000-04:00 title FTP Download Destination Tampering Vulnerability (Server 2003) version 66 accepted 2011-05-16T04:00:56.983-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description The FTP client in Windows XP SP1 and Server 2003, and Internet Explorer 6 SP1 on Windows 2000 SP4, when "Enable Folder View for FTP Sites" is enabled and the user manually initiates a file transfer, allows user-assisted, remote FTP servers to overwrite files in arbitrary locations via crafted filenames. family windows id oval:org.mitre.oval:def:1416 status accepted submitted 2005-10-12T12:00:00.000-04:00 title FTP Download Destination Tampering Vulnerability (Windows XP) version 68
References
- http://secunia.com/advisories/17163
- http://secunia.com/advisories/17163
- http://secunia.com/advisories/17172
- http://secunia.com/advisories/17172
- http://secunia.com/advisories/17223
- http://secunia.com/advisories/17223
- http://securitytracker.com/id?1015036
- http://securitytracker.com/id?1015036
- http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf
- http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf
- http://www.kb.cert.org/vuls/id/415828
- http://www.kb.cert.org/vuls/id/415828
- http://www.securiteam.com/windowsntfocus/6M00I0KEAU.html
- http://www.securiteam.com/windowsntfocus/6M00I0KEAU.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-044
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-044
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1146
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1146
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1284
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1284
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1416
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1416