Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.902821
Kategorie:FTP
Titel:Ricoh DC Software DL-10 FTP Server 'USER' Command Buffer Overflow Vulnerability
Zusammenfassung:Ricoh DC Software DL-10 FTP Server is prone to a buffer overflow; vulnerability.
Beschreibung:Summary:
Ricoh DC Software DL-10 FTP Server is prone to a buffer overflow
vulnerability.

Vulnerability Insight:
The flaw is caused by improper bounds checking by the FTP server
when processing malicious FTP commands. This can be exploited to cause a stack-based buffer
overflow via an overly long 'USER' FTP command.

Vulnerability Impact:
Successful exploitation may allow remote attackers to execute
arbitrary code within the context of the affected application. Failed exploit attempts will result
in a denial-of-service condition.

Affected Software/OS:
Ricoh DC Software DL-10 version 4.5.0.1. Other products might
be affected as well.

Solution:
No known solution was made available for at least one year
since the disclosure of this vulnerability. Likely none will be provided anymore. General solution
options are to upgrade to a newer release, disable respective features, remove the product or
replace the product by another one.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2012-5002
BugTraq ID: 52235
http://www.securityfocus.com/bid/52235
http://security.inshell.net/advisory/5
http://www.osvdb.org/79691
http://secunia.com/advisories/47912
XForce ISS Database: ricoh-user-bo(73591)
https://exchange.xforce.ibmcloud.com/vulnerabilities/73591
Common Vulnerability Exposure (CVE) ID: CVE-2015-6750
http://packetstormsecurity.com/files/133248/Ricoh-FTP-Server-1.1.0.6-Buffer-Overflow.html
CopyrightCopyright (C) 2012 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.