CVE-2006-2170
Published May 4, 2006
Last updated 7 years ago
Overview
- Description
- Buffer overflow in ArgoSoft FTP Server 1.4.3.6 allows remote attackers to execute arbitrary code via Unicode in the RNTO command, as demonstrated by the Infigo FTPStress Fuzzer.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.4
- Impact score
- 4.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E52B7406-3481-4692-A897-7B8E4BCF4ADE" }, { "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92A87072-6A64-4400-B839-D7E178AA03AB" }, { "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47EA17F1-AE32-43AF-B11C-13B8D1D5B448" }, { "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FED4F896-AC49-44C5-A7DE-13052F6B9C26" }, { "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C462CC04-10A2-4F4C-9E6D-139599D03E23" }, { "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B8BA120-D506-4688-B524-275A1FB54C18" }, { "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00BEE9B9-B5B9-4FC5-8BE7-554629042868" }, { "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA27A4CC-41E2-424D-A9EF-93FE0D8F1DEA" }, { "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFE4FC9C-2281-4BDD-88FA-8E94D5CA08FE" }, { "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D0097A7-8713-4979-A6CD-F5086741706D" }, { "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68592EA7-2237-4BF0-8769-5942B6D065D7" }, { "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9955ED25-075F-4818-BFAD-070D19EBBA30" }, { "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F374225-32E4-4FDF-B8D0-1576CCFEC1BC" }, { "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19774B84-7368-4568-8E92-ECD8F19FC2E3" }, { "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.2.29:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2383B139-13E2-416B-9E2E-4D945635CE93" }, { "criteria": "cpe:2.3:a:argosoft:ftp_server:1.4.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9DFB123-9769-4A4B-9BCA-29195F5B1A5C" } ], "operator": "OR" } ] } ]