CVE-2006-6183

3com 3ctftpsvc < 2.0.1 - Memory Corruption

Title source: rule

Description

Multiple stack-based buffer overflows in 3Com 3CTftpSvc 2.0.1, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long mode field (aka transporting mode) in a (1) GET or (2) PUT command.

Exploits (6)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16347
exploitdb WORKING POC VERIFIED
by Umesh Wanve · perlremotewindows
https://www.exploit-db.com/exploits/3388
exploitdb WORKING POC VERIFIED
by Enseirb · remotewindows
https://www.exploit-db.com/exploits/3170
exploitdb WORKING POC VERIFIED
by cthulhu · rubyremotewindows
https://www.exploit-db.com/exploits/2865
exploitdb WORKING POC VERIFIED
by Liu Qixu · pythondoswindows
https://www.exploit-db.com/exploits/2855
metasploit WORKING POC GREAT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/tftp/threectftpsvc_long_mode.rb

Scores

EPSS 0.5146
EPSS Percentile 97.9%

Details

CWE
CWE-119
Status published
Products (1)
3com/3ctftpsvc < 2.0.1
Published Dec 01, 2006
Tracked Since Feb 18, 2026