CVE-2010-3972
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
23/12/2010
Last modified:
11/04/2025
Description
Heap-based buffer overflow in the TELNET_STREAM_CONTEXT::OnSendData function in ftpsvc.dll in Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) 7.0, and IIS 7.5, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted FTP command, aka "IIS FTP Service Heap Buffer Overrun Vulnerability." NOTE: some of these details are obtained from third party information.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:microsoft:internet_information_services:7.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx
- http://secunia.com/advisories/42713
- http://www.exploit-db.com/exploits/15803
- http://www.kb.cert.org/vuls/id/842372
- http://www.securityfocus.com/bid/45542
- http://www.securitytracker.com/id?1024921=
- http://www.vupen.com/english/advisories/2010/3305
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-004
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64248
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12370
- http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx
- http://secunia.com/advisories/42713
- http://www.exploit-db.com/exploits/15803
- http://www.kb.cert.org/vuls/id/842372
- http://www.securityfocus.com/bid/45542
- http://www.securitytracker.com/id?1024921=
- http://www.vupen.com/english/advisories/2010/3305
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-004
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64248
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12370