Description
Multiple buffer overflows in WinEggDropShell remote access trojan (RAT) 1.7 allow remote attackers to execute arbitrary code via (1) a long GET request to the HTTP server, or a long (2) USER or (3) PASS command to the FTP server.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Sowhat · pythondoswindows
https://www.exploit-db.com/exploits/1353
References (5)
Core 5
Core References
Exploit, Vendor Advisory mailing-list
x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0059.html
Vendor Advisory x_refsource_misc
http://secway.org/advisory/AD20051202.txt
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/226
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/15682
Exploit, Vendor Advisory mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/418398
Scores
EPSS
0.1049
EPSS Percentile
93.3%
Details
Status
published
Products (1)
wineggdropshell/wineggdropshell
1.7
Published
Dec 04, 2005
Tracked Since
Feb 18, 2026