CVE-2014-0603
Attachmate Reflection Pro FTP rftpcom15.dll GetSiteProperties3 Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The rftpcom.dll ActiveX control in Attachmate Reflection FTP Client before 14.1.429 allows remote attackers to cause a denial of service (memory corruption) and execute arbitrary code via vectors related to the (1) GetGlobalSettings or (2) GetSiteProperties3 methods, which triggers a dereference of an arbitrary memory address. NOTE: this issue was MERGED with CVE-2014-0606 because it is the same type of vulnerability, affecting the same set of versions, and discovered by the same researcher.
El control rftpcom.dll de ActiveX en Attachmate Reflection FTP Client anterior a 14.1.429 permite a atacantes remotos causar una denegación de servicio (corrupción de memoria) y ejecutar código arbitrario a través de vectores relacionados con los métodos (1) GetGlobalSettings o (2) GetSiteProperties3, lo que provoca una referencia de una dirección de memoria arbitraria. NOTA: este problema fue fusionado (MERGED) con CVE-2014-0606 porque se trata del mismo tipo de vulnerabilidad, que afecta el mismo juego de versiones y que fue descubierto por el mismo investigador.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Attachmate Reflection Pro FTP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the ActiveX control's GetSiteProperties3 method. The control suffers from an untrusted pointer dereference vulnerability because it blindly dereferences an attacker-supplied memory address. An attacker can exploit this condition to achieve code execution under the context of the browser process.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-12-28 CVE Reserved
- 2014-08-12 CVE Published
- 2024-08-06 CVE Updated
- 2024-11-02 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.zerodayinitiative.com/advisories/ZDI-14-288 | X_refsource_misc | |
http://www.zerodayinitiative.com/advisories/ZDI-14-291 | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://support.attachmate.com/techdocs/2501.html | 2015-02-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Attachmate Search vendor "Attachmate" | Reflection Ftp Client Search vendor "Attachmate" for product "Reflection Ftp Client" | <= 14.1.420 Search vendor "Attachmate" for product "Reflection Ftp Client" and version " <= 14.1.420" | - |
Affected
|