CVE-2007-2586
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/05/2007
Last modified:
09/04/2025
Description
The FTP Server in Cisco IOS 11.3 through 12.4 does not properly check user authorization, which allows remote attackers to execute arbitrary code, and have other impact including reading startup-config, as demonstrated by a crafted MKD command that involves access to a VTY device and overflows a buffer, aka bug ID CSCek55259.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:cisco:ios:12.0\(1\)t:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios:12.0\(1\)t1:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios:12.0\(1\)xe:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios:12.0\(2\)s:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios:12.0\(2\)t:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios:12.0\(2\)t1:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios:12.0\(2\)xe:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios:12.0\(2\)xe1:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios:12.0\(2\)xe3:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios:12.0\(2\)xe4:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios:12.0\(2a\)t1:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios:12.0\(3\)s:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios:12.0\(3\)t:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios:12.0\(3\)t2:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios:12.0\(3\)t3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://seclists.org/bugtraq/2009/Jan/0183.html
- http://secunia.com/advisories/25199
- http://www.cisco.com/en/US/products/products_security_advisory09186a00808399d0.shtml
- http://www.exploit-db.com/exploits/6155
- http://www.osvdb.org/35334
- http://www.securityfocus.com/archive/1/494868
- http://www.securityfocus.com/bid/23885
- http://www.securitytracker.com/id?1018030=
- http://www.vupen.com/english/advisories/2007/1749
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34197
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5036
- http://seclists.org/bugtraq/2009/Jan/0183.html
- http://secunia.com/advisories/25199
- http://www.cisco.com/en/US/products/products_security_advisory09186a00808399d0.shtml
- http://www.exploit-db.com/exploits/6155
- http://www.osvdb.org/35334
- http://www.securityfocus.com/archive/1/494868
- http://www.securityfocus.com/bid/23885
- http://www.securitytracker.com/id?1018030=
- http://www.vupen.com/english/advisories/2007/1749
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34197
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5036