Vulnerabilities > CVE-2005-4568 - Unspecified vulnerability in Floosietek Ftgate 4.4Build4.4.000
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN floosietek
nessus
Summary
Multiple format string vulnerabilities in FTGate Technology (formerly known as Floosietek) FTGate 4.4 (aka Build 4.4.000 Oct 26 2005) allow remote attackers to execute arbitrary code via format string specifiers in the (1) USER, (2) PASS, and (3) TOP commands to the POP3 server; and the (4) LIST and (5) AUTHENTICATE commands to the IMAP server.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | CGI abuses |
NASL id | FTGATE_44002.NASL |
description | The remote host appears to be running a version of FTGate, a commercial groupware mail server for Windows from FTGate Technology Ltd. The web server used to administer FTGate on the remote host fails to sanitize input to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20337 |
published | 2005-12-21 |
reporter | This script is Copyright (C) 2005-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/20337 |
title | FTGate <= 4.4.002 Multiple Remote Vulnerabilities (OF, FS, XSS) |
code |
|
References
- http://archives.neohapsis.com/archives/fulldisclosure/2005-12/1017.html
- http://archives.neohapsis.com/archives/fulldisclosure/2005-12/1017.html
- http://archives.neohapsis.com/archives/fulldisclosure/2005-12/1019.html
- http://archives.neohapsis.com/archives/fulldisclosure/2005-12/1019.html
- http://www.securityfocus.com/bid/15972
- http://www.securityfocus.com/bid/15972
- http://www.vupen.com/english/advisories/2005/3010
- http://www.vupen.com/english/advisories/2005/3010