National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2005-2126 Detail

Current Description

The FTP client in Windows XP SP1 and Server 2003, and Internet Explorer 6 SP1 on Windows 2000 SP4, when "Enable Folder View for FTP Sites" is enabled and the user manually initiates a file transfer, allows user-assisted, remote FTP servers to overwrite files in arbitrary locations via crafted filenames.

Source:  MITRE      Last Modified:  10/21/2005      View Analysis Description

Quick Info

CVE Dictionary Entry:
CVE-2005-2126
Original release date:
10/21/2005
Last revised:
10/10/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
2.6 LOW
Vector:
(AV:N/AC:H/Au:N/C:N/I:P/A:N) (legend)
Impact Subscore:
2.9
Exploitability Subscore:
4.9
CVSS Version 2 Metrics:
Access Vector:
Network exploitable - Victim must voluntarily interact with attack mechanism
Access Complexity:
High
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized modification

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://securitytracker.com/id?1015036 External Source SECTRACK 1015036
http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf External Source CONFIRM http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf
http://www.kb.cert.org/vuls/id/415828 Third Party Advisory; US Government Resource External Source CERT-VN VU#415828
http://www.microsoft.com/technet/security/bulletin/ms05-044.mspx Patch; Vendor Advisory External Source MS MS05-044
http://www.securiteam.com/windowsntfocus/6M00I0KEAU.html Patch External Source MISC http://www.securiteam.com/windowsntfocus/6M00I0KEAU.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1146 External Source OVAL oval:org.mitre.oval:def:1146
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1284 External Source OVAL oval:org.mitre.oval:def:1284
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1416 External Source OVAL oval:org.mitre.oval:def:1416

References to Check Content

Identifier:
oval:org.mitre.oval:def:1146
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:1146
Identifier:
oval:org.mitre.oval:def:1284
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:1284
Identifier:
oval:org.mitre.oval:def:1416
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:1416

Technical Details

Vulnerability Type (View All)

Change History 3 change records found - show changes