CVE-2006-0705

Format string vulnerability in a logging function as used by various SFTP servers, including (1) AttachmateWRQ Reflection for Secure IT UNIX Server before 6.0.0.9, (2) Reflection for Secure IT Windows Server before 6.0 build 38, (3) F-Secure SSH Server for Windows before 5.3 build 35, (4) F-Secure SSH Server for UNIX 3.0 through 5.0.8, (5) SSH Tectia Server 4.3.6 and earlier and 4.4.0, and (6) SSH Shell Server 3.2.9 and earlier, allows remote authenticated users to execute arbitrary commands via unspecified vectors, involving crafted filenames and the stat command.
References
Link Resource
http://marc.info/?l=bugtraq&m=120654385125315&w=2
http://marc.info/?l=bugtraq&m=120654385125315&w=2
http://secunia.com/advisories/18828 Patch Vendor Advisory
http://secunia.com/advisories/18843 Patch Vendor Advisory
http://secunia.com/advisories/24516 Vendor Advisory
http://secunia.com/advisories/29552 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200703-13.xml
http://securitytracker.com/id?1015619 Patch
http://support.wrq.com/techdocs/1882.html Patch
http://www.kb.cert.org/vuls/id/419241 Patch US Government Resource
http://www.securityfocus.com/bid/16625 Patch
http://www.securityfocus.com/bid/16640
http://www.vupen.com/english/advisories/2006/0554 Vendor Advisory
http://www.vupen.com/english/advisories/2006/0555 Vendor Advisory
http://www.vupen.com/english/advisories/2008/1008/references Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/24651
http://marc.info/?l=bugtraq&m=120654385125315&w=2
http://marc.info/?l=bugtraq&m=120654385125315&w=2
http://secunia.com/advisories/18828 Patch Vendor Advisory
http://secunia.com/advisories/18843 Patch Vendor Advisory
http://secunia.com/advisories/24516 Vendor Advisory
http://secunia.com/advisories/29552 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200703-13.xml
http://securitytracker.com/id?1015619 Patch
http://support.wrq.com/techdocs/1882.html Patch
http://www.kb.cert.org/vuls/id/419241 Patch US Government Resource
http://www.securityfocus.com/bid/16625 Patch
http://www.securityfocus.com/bid/16640
http://www.vupen.com/english/advisories/2006/0554 Vendor Advisory
http://www.vupen.com/english/advisories/2006/0555 Vendor Advisory
http://www.vupen.com/english/advisories/2008/1008/references Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/24651
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:attachmatewrq:reflection_for_secure_it_server:6.0:*:unix:*:*:*:*:*
cpe:2.3:a:attachmatewrq:reflection_for_secure_it_server:6.0:*:win:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:3.0.1:*:unix:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:3.0.9:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:3.1.0:*:unix:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:3.1.0_build9:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:3.2.0:*:unix:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:3.2.3:*:unix:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:5.0:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:5.1:*:win:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:5.2:*:win:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_ssh_server:5.3:*:win:*:*:*:*:*

History

21 Nov 2024, 00:07

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=120654385125315&w=2 - () http://marc.info/?l=bugtraq&m=120654385125315&w=2 -
References () http://secunia.com/advisories/18828 - Patch, Vendor Advisory () http://secunia.com/advisories/18828 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18843 - Patch, Vendor Advisory () http://secunia.com/advisories/18843 - Patch, Vendor Advisory
References () http://secunia.com/advisories/24516 - Vendor Advisory () http://secunia.com/advisories/24516 - Vendor Advisory
References () http://secunia.com/advisories/29552 - Vendor Advisory () http://secunia.com/advisories/29552 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200703-13.xml - () http://security.gentoo.org/glsa/glsa-200703-13.xml -
References () http://securitytracker.com/id?1015619 - Patch () http://securitytracker.com/id?1015619 - Patch
References () http://support.wrq.com/techdocs/1882.html - Patch () http://support.wrq.com/techdocs/1882.html - Patch
References () http://www.kb.cert.org/vuls/id/419241 - Patch, US Government Resource () http://www.kb.cert.org/vuls/id/419241 - Patch, US Government Resource
References () http://www.securityfocus.com/bid/16625 - Patch () http://www.securityfocus.com/bid/16625 - Patch
References () http://www.securityfocus.com/bid/16640 - () http://www.securityfocus.com/bid/16640 -
References () http://www.vupen.com/english/advisories/2006/0554 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/0554 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/0555 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/0555 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/1008/references - Vendor Advisory () http://www.vupen.com/english/advisories/2008/1008/references - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24651 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24651 -

Information

Published : 2006-02-15 11:06

Updated : 2024-11-21 00:07


NVD link : CVE-2006-0705

Mitre link : CVE-2006-0705

CVE.ORG link : CVE-2006-0705


JSON object : View

Products Affected

attachmatewrq

  • reflection_for_secure_it_server

f-secure

  • f-secure_ssh_server
CWE
CWE-134

Use of Externally-Controlled Format String