Vulnerability Details : CVE-2012-5002
Public exploit exists!
Stack-based buffer overflow in SR10 FTP server (SR10.exe) 1.1.0.6 in Ricoh DC Software DL-10 4.5.0.1, when the Log file name option is enabled, allows remote attackers to execute arbitrary code via a long USER FTP command.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2012-5002
Probability of exploitation activity in the next 30 days: 61.35%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 98 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2012-5002
-
Ricoh DC DL-10 SR10 FTP USER Command Buffer Overflow
Disclosure Date: 2012-03-01First seen: 2020-04-26exploit/windows/ftp/ricoh_dl_bofThis module exploits a vulnerability found in Ricoh DC's DL-10 SR10 FTP service. By supplying a long string of data to the USER command, it is possible to trigger a stack-based buffer overflow, which allows remote code execution under the context of the user.
CVSS scores for CVE-2012-5002
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2012-5002
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-5002
-
http://security.inshell.net/advisory/5
404 Not FoundExploit
-
http://www.securityfocus.com/bid/52235
Ricoh Company DC Software DL-10 'USER' Command Remote Buffer Overflow VulnerabilityExploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/73591
Ricoh DC Software DL-10 USER buffer overflow CVE-2012-5002 Vulnerability Report
Products affected by CVE-2012-5002
- cpe:2.3:a:ricoh:dl-10:4.5.0.1:*:*:*:*:*:*:*
- cpe:2.3:h:ricoh:sr10_ftp_server:1.1.0.6:*:*:*:*:*:*:*