CVE-2005-3992

Wineggdropshell - Buffer Overflow

Title source: rule
STIX 2.1

Description

Multiple buffer overflows in WinEggDropShell remote access trojan (RAT) 1.7 allow remote attackers to execute arbitrary code via (1) a long GET request to the HTTP server, or a long (2) USER or (3) PASS command to the FTP server.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Sowhat · pythondoswindows
https://www.exploit-db.com/exploits/1353

References (5)

Core 5
Core References
Exploit, Vendor Advisory mailing-list x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0059.html
Vendor Advisory x_refsource_misc
http://secway.org/advisory/AD20051202.txt
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/226
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/15682
Exploit, Vendor Advisory mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/418398

Scores

EPSS 0.1049
EPSS Percentile 93.3%

Details

Status published
Products (1)
wineggdropshell/wineggdropshell 1.7
Published Dec 04, 2005
Tracked Since Feb 18, 2026