CVE-2005-3992

N/A Unknown
Published: December 04, 2005 Modified: April 16, 2026
View on NVD

Description

Multiple buffer overflows in WinEggDropShell remote access trojan (RAT) 1.7 allow remote attackers to execute arbitrary code via (1) a long GET request to the HTTP server, or a long (2) USER or (3) PASS command to the FTP server.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secway.org/advisory/AD20051202.txt
Source: cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/archive/1/418398
Source: cve@mitre.org
Exploit Vendor Advisory
http://www.securityfocus.com/bid/15682
Source: cve@mitre.org
Exploit
http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0059.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Vendor Advisory
http://securityreason.com/securityalert/226
Source: af854a3a-2127-422b-91ae-364da2661108
http://secway.org/advisory/AD20051202.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/418398
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Vendor Advisory
http://www.securityfocus.com/bid/15682
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit

10 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
10.5%
93th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

wineggdropshell