ID CVE-2005-1415
Summary Buffer overflow in GlobalSCAPE Secure FTP Server 3.0.2 allows remote authenticated users to execute arbitrary code via a long FTP command.
References
Vulnerable Configurations
  • cpe:2.3:a:globalscape:secure_ftp_server:3.0
    cpe:2.3:a:globalscape:secure_ftp_server:3.0
  • cpe:2.3:a:globalscape:secure_ftp_server:3.0.2
    cpe:2.3:a:globalscape:secure_ftp_server:3.0.2
CVSS
Base: 10.0 (as of 13-05-2005 - 10:36)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
exploit-db via4
  • description GlobalScape Secure FTP Server 3.0 Buffer Overflow Exploit. CVE-2005-1415. Remote exploit for windows platform
    id EDB-ID:975
    last seen 2016-01-31
    modified 2005-05-01
    published 2005-05-01
    reporter muts
    source https://www.exploit-db.com/download/975/
    title GlobalScape Secure FTP Server 3.0 - Buffer Overflow Exploit
  • description GlobalSCAPE Secure FTP Server Input Overflow. CVE-2005-1415. Remote exploit for windows platform
    id EDB-ID:16703
    last seen 2016-02-02
    modified 2010-10-05
    published 2010-10-05
    reporter metasploit
    source https://www.exploit-db.com/download/16703/
    title GlobalSCAPE Secure FTP Server Input Overflow
metasploit via4
description This module exploits a buffer overflow in the GlobalSCAPE Secure FTP Server. All versions prior to 3.0.3 are affected by this flaw. A valid user account ( or anonymous access) is required for this exploit to work.
id MSF:EXPLOIT/WINDOWS/FTP/GLOBALSCAPEFTP_INPUT
last seen 2019-03-16
modified 2017-07-24
published 2005-11-24
reliability Great
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/ftp/globalscapeftp_input.rb
title GlobalSCAPE Secure FTP Server Input Overflow
nessus via4
  • NASL family FTP
    NASL id GLOBALSCAPEFTP_USER_INPUT.NASL
    description The remote host is running GlobalSCAPE Secure FTP Server. GlobalSCAPE Secure FTP Server 3.0.2 and prior versions are affected by a buffer overflow due to mishandling the user-supplied input. An attacker would first need to authenticate to the server before they can execute arbitrary commands.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 18627
    published 2005-07-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=18627
    title GlobalSCAPE Secure FTP Server User Input Overflow
  • NASL family FTP
    NASL id FTP_OVERFLOW.NASL
    description The remote FTP server closes the connection when a command or argument is too long. This is probably due to a buffer overflow and may allow an attacker to execute arbitrary code on the remote host.
    last seen 2019-02-21
    modified 2018-08-31
    plugin id 10084
    published 1999-06-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=10084
    title Multiple FTP Server Command Handling Overflow
packetstorm via4
data source https://packetstormsecurity.com/files/download/82955/globalscapeftp_input.rb.txt
id PACKETSTORM:82955
last seen 2016-12-05
published 2009-11-26
reporter Mati Aharoni
source https://packetstormsecurity.com/files/82955/GlobalSCAPE-Secure-FTP-Server-Input-Overflow.html
title GlobalSCAPE Secure FTP Server Input Overflow
refmap via4
bid 13454
confirm http://www.cuteftp.com/gsftps/history.asp
fulldisc 20050501 Remote buffer overflow in GlobalScape Secure FTP server 3.0.2
Last major update 05-09-2008 - 16:49
Published 03-05-2005 - 00:00
Back to Top