ID CVE-2005-2126 Type cve Reporter NVD Modified 2017-10-10T21:30:14
Description
The FTP client in Windows XP SP1 and Server 2003, and Internet Explorer 6 SP1 on Windows 2000 SP4, when "Enable Folder View for FTP Sites" is enabled and the user manually initiates a file transfer, allows user-assisted, remote FTP servers to overwrite files in arbitrary locations via crafted filenames.
{"id": "CVE-2005-2126", "bulletinFamily": "NVD", "title": "CVE-2005-2126", "description": "The FTP client in Windows XP SP1 and Server 2003, and Internet Explorer 6 SP1 on Windows 2000 SP4, when \"Enable Folder View for FTP Sites\" is enabled and the user manually initiates a file transfer, allows user-assisted, remote FTP servers to overwrite files in arbitrary locations via crafted filenames.", "published": "2005-10-21T14:02:00", "modified": "2017-10-10T21:30:14", "cvss": {"score": 2.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2126", "reporter": "NVD", "references": ["http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf", "http://www.securiteam.com/windowsntfocus/6M00I0KEAU.html", "http://securitytracker.com/id?1015036", "http://www.kb.cert.org/vuls/id/415828", "http://www.microsoft.com/technet/security/bulletin/ms05-044.mspx"], "cvelist": ["CVE-2005-2126"], "type": "cve", "lastseen": "2017-10-11T11:06:17", "history": [{"bulletin": {"assessment": {"href": "http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1146", "name": "oval:org.mitre.oval:def:1146", "system": "http://oval.mitre.org/XMLSchema/oval-definitions-5"}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:microsoft:ie:6.0:sp1", "cpe:/o:microsoft:windows_2003_server:r2", "cpe:/o:microsoft:windows_2000::sp4::fr", "cpe:/o:microsoft:windows_xp::sp1:tablet_pc"], "cvelist": ["CVE-2005-2126"], "cvss": {"score": 2.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "description": "The FTP client in Windows XP SP1 and Server 2003, and Internet Explorer 6 SP1 on Windows 2000 SP4, when \"Enable Folder View for FTP Sites\" is enabled and the user manually initiates a file transfer, allows user-assisted, remote FTP servers to overwrite files in arbitrary locations via crafted filenames.", "edition": 2, "enchantments": {}, "hash": "38c3fe52118c0b657ea3659e0be636bef55688164b06360d076ebf2a1494a8e6", "hashmap": [{"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "a22390976d3c459a0dbcbd76ddc3ef52", "key": "assessment"}, {"hash": "7de35a348a0562c7c2cac7b36eb3863d", "key": "cvss"}, {"hash": "402c40875ecb606924af9edebeb877a9", "key": "cvelist"}, {"hash": "bbf0e0304382aaf4990d62625f596a4d", "key": "href"}, {"hash": "8357d8344d35dd1bc960ec37664e41dc", "key": "references"}, {"hash": "e150f9593a7df7e0ea89f5edd91afa94", "key": "title"}, {"hash": "dbe248605628b44fbcbbbef31ca50f74", "key": "description"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "da0b2b54a0e2494e267c85ee5f0a1865", "key": "published"}, {"hash": "e65b006e1788abc94c79c04f5d085216", "key": "cpe"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "80e65a588d35d3dace4821542acd721b", "key": "scanner"}, {"hash": "4ba68ff6ce83ce5a3b286e94a3475280", "key": "modified"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2126", "id": "CVE-2005-2126", "lastseen": "2017-04-18T15:51:18", "modified": "2008-09-10T15:41:06", "objectVersion": "1.2", "published": "2005-10-21T14:02:00", "references": ["http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf", "http://www.securiteam.com/windowsntfocus/6M00I0KEAU.html", "http://securitytracker.com/id?1015036", "http://www.kb.cert.org/vuls/id/415828", "http://www.microsoft.com/technet/security/bulletin/ms05-044.mspx"], "reporter": "NVD", "scanner": [{"href": "http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:1416", "name": "oval:org.mitre.oval:def:1416", "system": "http://oval.mitre.org/XMLSchema/oval-definitions-5"}], "title": "CVE-2005-2126", "type": "cve", "viewCount": 1}, "differentElements": ["assessment", "modified"], "edition": 2, "lastseen": "2017-04-18T15:51:18"}, {"bulletin": {"assessment": {"href": "http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1416", "name": "oval:org.mitre.oval:def:1416", "system": "http://oval.mitre.org/XMLSchema/oval-definitions-5"}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:microsoft:ie:6.0:sp1", "cpe:/o:microsoft:windows_2003_server:r2", "cpe:/o:microsoft:windows_2000::sp4::fr", "cpe:/o:microsoft:windows_xp::sp1:tablet_pc"], "cvelist": ["CVE-2005-2126"], "cvss": {"score": 2.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "description": "The FTP client in Windows XP SP1 and Server 2003, and Internet Explorer 6 SP1 on Windows 2000 SP4, when \"Enable Folder View for FTP Sites\" is enabled and the user manually initiates a file transfer, allows user-assisted, remote FTP servers to overwrite files in arbitrary locations via crafted filenames.", "edition": 1, "hash": "f358901ae647e13b9529e1f6a8bd4805a97e8bd69cd8eb9f030e9d764105e093", "hashmap": [{"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "7de35a348a0562c7c2cac7b36eb3863d", "key": "cvss"}, {"hash": "402c40875ecb606924af9edebeb877a9", "key": "cvelist"}, {"hash": "bbf0e0304382aaf4990d62625f596a4d", "key": "href"}, {"hash": "8357d8344d35dd1bc960ec37664e41dc", "key": "references"}, {"hash": "3c9d8685187ee2e11bce455515010f43", "key": "assessment"}, {"hash": "e150f9593a7df7e0ea89f5edd91afa94", "key": "title"}, {"hash": "dbe248605628b44fbcbbbef31ca50f74", "key": "description"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "da0b2b54a0e2494e267c85ee5f0a1865", "key": "published"}, {"hash": "e65b006e1788abc94c79c04f5d085216", "key": "cpe"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "80e65a588d35d3dace4821542acd721b", "key": "scanner"}, {"hash": "4ba68ff6ce83ce5a3b286e94a3475280", "key": "modified"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2126", "id": "CVE-2005-2126", "lastseen": "2016-09-03T05:34:59", "modified": "2008-09-10T15:41:06", "objectVersion": "1.2", "published": "2005-10-21T14:02:00", "references": ["http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf", "http://www.securiteam.com/windowsntfocus/6M00I0KEAU.html", "http://securitytracker.com/id?1015036", "http://www.kb.cert.org/vuls/id/415828", "http://www.microsoft.com/technet/security/bulletin/ms05-044.mspx"], "reporter": "NVD", "scanner": [{"href": "http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:1416", "name": "oval:org.mitre.oval:def:1416", "system": "http://oval.mitre.org/XMLSchema/oval-definitions-5"}], "title": "CVE-2005-2126", "type": "cve", "viewCount": 0}, "differentElements": ["assessment"], "edition": 1, "lastseen": "2016-09-03T05:34:59"}], "edition": 3, "hashmap": [{"key": "assessment", "hash": "399c2fce9a3b60ad47ee4484423814a0"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "e65b006e1788abc94c79c04f5d085216"}, {"key": "cvelist", "hash": "402c40875ecb606924af9edebeb877a9"}, {"key": "cvss", "hash": "7de35a348a0562c7c2cac7b36eb3863d"}, {"key": "description", "hash": "dbe248605628b44fbcbbbef31ca50f74"}, {"key": "href", "hash": "bbf0e0304382aaf4990d62625f596a4d"}, {"key": "modified", "hash": "9d9970a67ff80afa5b2ab7d0e599370e"}, {"key": "published", "hash": "da0b2b54a0e2494e267c85ee5f0a1865"}, {"key": "references", "hash": "8357d8344d35dd1bc960ec37664e41dc"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "80e65a588d35d3dace4821542acd721b"}, {"key": "title", "hash": "e150f9593a7df7e0ea89f5edd91afa94"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "a8d491b147bda5e50cf4da7721088ed7a4c0b8fbe4582d90a9a52ec91931c33c", "viewCount": 1, "enchantments": {"vulnersScore": 4.3}, "objectVersion": "1.3", "cpe": ["cpe:/a:microsoft:ie:6.0:sp1", "cpe:/o:microsoft:windows_2003_server:r2", "cpe:/o:microsoft:windows_2000::sp4::fr", "cpe:/o:microsoft:windows_xp::sp1:tablet_pc"], "assessment": {"href": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1146", "name": "oval:org.mitre.oval:def:1146", "system": "http://oval.mitre.org/XMLSchema/oval-definitions-5"}, "scanner": [{"href": "http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:1416", "name": "oval:org.mitre.oval:def:1416", "system": "http://oval.mitre.org/XMLSchema/oval-definitions-5"}]}
{"result": {"cert": [{"id": "VU:415828", "type": "cert", "title": "Microsoft Windows FTP client does not properly validate received file names", "description": "### Overview\n\nAn input validation error in the Microsoft Windows FTP Client may allow a remote attacker to write files to arbitrary locations and may allow the execution of arbitrary code.\n\n### Description\n\nThe Microsoft Windows FTP Client does not properly validate the names of received files. If a remote attacker can persuade a user to download a file with a specially crafted name using the Windows FTP Client, that attacker may be able to write that file to an arbitrary location on the users system. In order to exploit this vulnerability, the crafted file name must map to an existing location on the user's system. \n\nNote that this vulnerability may allow a remote attacker to execute arbitrary code. For instance, an attacker may be able to leverage this vulnerability to download an arbitrary file to the Startup folder. If the downloaded file is executable, then that file will be executed the next time a user logs in. \n \nFor more information, including a list of affected software, please see [MS05-044](<http://www.microsoft.com/technet/security/Bulletin/MS05-044.mspx>). Please note that exploit code for this vulnerability is publicly available. \n \n--- \n \n### Impact\n\nA remote attacker may be able to write files to arbitrary locations on a vulnerable system. If the target location is the Startup folder, then it is possible to cause arbitrary code to be automatically executed the next time the user logs in. \n \n--- \n \n### Solution\n\n**Apply a patch**\n\nMicrosoft has addressed this issue in Microsoft Security Bulletin [MS05-044](<http://www.microsoft.com/technet/security/Bulletin/MS05-044.mspx>) \n \n--- \n \n**Do not download files from untrusted source****s**\n\n \nBy only downloading files from trusted sources, the chances of exploitation are reduced. \n \n--- \n \n### Systems Affected \n\nVendor| Status| Date Notified| Date Updated \n---|---|---|--- \nMicrosoft Corporation| | -| 12 Oct 2005 \nIf you are a vendor and your product is affected, [let us know](<mailto:cert@cert.org?Subject=VU%23415828 Vendor Status Inquiry>).\n\n### CVSS Metrics \n\nGroup | Score | Vector \n---|---|--- \nBase | N/A | N/A \nTemporal | N/A | N/A \nEnvironmental | N/A | N/A \n \n### References\n\n * <http://www.microsoft.com/technet/security/Bulletin/MS05-044.mspx>\n * <http://secunia.com/advisories/17163/>\n\n### Credit\n\nThis vulnerability was reported by Microsoft in [MS05-044](<http://www.microsoft.com/technet/security/Bulletin/MS05-044.mspx>).\n\nThis document was written by Jeff Gennari.\n\n### Other Information\n\n * CVE IDs: [CAN-2005-2126](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CAN-2005-2126>)\n * Date Public: 11 Oct 2005\n * Date First Published: 13 Oct 2005\n * Date Last Updated: 14 Oct 2005\n * Severity Metric: 16.20\n * Document Revision: 40\n\n", "published": "2005-10-13T00:00:00", "cvss": {"score": 2.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.kb.cert.org/vuls/id/415828", "cvelist": ["CVE-2005-2126", "CVE-2005-2126"], "lastseen": "2016-02-03T09:12:51"}], "osvdb": [{"id": "OSVDB:19901", "type": "osvdb", "title": "Microsoft Windows FTP Client Arbitrary File Write", "description": "# No description provided by the source\n\n## References:\n[Vendor Specific Advisory URL](http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=361442&RenditionID=)\nSecurity Tracker: 1015036\n[Secunia Advisory ID:17223](https://secuniaresearch.flexerasoftware.com/advisories/17223/)\n[Secunia Advisory ID:17163](https://secuniaresearch.flexerasoftware.com/advisories/17163/)\nOther Advisory URL: http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf\nOther Advisory URL: http://www.securiteam.com/windowsntfocus/6M00I0KEAU.html\nOther Advisory URL: http://www.auscert.org.au/render.html?it=5592\nMicrosoft Security Bulletin: MS05-044\nMicrosoft Knowledge Base Article: 905495\nKeyword: 2005006318\nGeneric Exploit URL: http://www.frsirt.com/exploits/20051013.ms05-044.c.php\nFrSIRT Advisory: ADV-2005-2041\n[CVE-2005-2126](https://vulners.com/cve/CVE-2005-2126)\nCERT VU: 415828\nBugtraq ID: 12160\n", "published": "2005-10-11T21:02:46", "cvss": {"score": 2.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://vulners.com/osvdb/OSVDB:19901", "cvelist": ["CVE-2005-2126"], "lastseen": "2017-04-28T13:20:16"}], "nessus": [{"id": "SMB_NT_MS05-044.NASL", "type": "nessus", "title": "MS05-044: Vulnerability in the Windows FTP Client Could Allow File Transfer Location Tampering (905495)", "description": "The remote host contains a version of the Microsoft FTP client that contains a flaw in the way it handles FTP download. An attacker could exploit this flaw to modify the destination location for files downloaded via FTP.\n\nTo exploit this flaw an attacker would need to set up a rogue FTP server and have a victim on the remote host connect to it and download a file manually using the affected client.", "published": "2005-10-11T00:00:00", "cvss": {"score": 2.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=19997", "cvelist": ["CVE-2005-2126"], "lastseen": "2017-10-29T13:38:57"}]}}