Executive Summary

Informations
Name CVE-2010-2075 First vendor Publication 2010-06-15
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 through June 2010, contains an externally introduced modification (Trojan Horse) in the DEBUG3_DOLOG_SYSTEM macro, which allows remote attackers to execute arbitrary commands.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2075

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2011-03-09 Name : Gentoo Security Advisory GLSA 201006-21 (unrealircd)
File : nvt/glsa_201006_21.nasl
2010-06-22 Name : UnrealIRCd Buffer Overflow Vulnerability
File : nvt/secpod_unrealircd_bof_vuln.nasl
2010-06-13 Name : Check for Backdoor in unrealircd
File : nvt/remote-irc-unrealircd-backdoor.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
65445 UnrealIRCd Trojaned Distribution

Unreal IRCD contains a backdoor in versions of 3.2.8.1 containing the MD5 checksum of MD5 checksum of 752e46f2d873c1679fa99de3f52a274d that may allow an attacker to execute arbitrary shell commands.

Snort® IPS/IDS

Date Description
2014-01-10 UnrealIRCd backdoor command execution attempt
RuleID : 25106 - Revision : 5 - Type : MALWARE-BACKDOOR

Nessus® Vulnerability Scanner

Date Description
2010-06-15 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201006-21.nasl - Type : ACT_GATHER_INFO
2010-06-14 Name : The remote IRC server contains a backdoor.
File : unreal_ircd_backdoor.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://osvdb.org/65445
http://seclists.org/fulldisclosure/2010/Jun/277
http://seclists.org/fulldisclosure/2010/Jun/284
http://secunia.com/advisories/40169
http://security.gentoo.org/glsa/glsa-201006-21.xml
http://www.exploit-db.com/exploits/13853
http://www.openwall.com/lists/oss-security/2010/06/14/11
http://www.securityfocus.com/bid/40820
http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txt
http://www.vupen.com/english/advisories/2010/1437
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
Date Informations
2024-11-28 23:08:21
  • Multiple Updates
2024-11-28 12:22:04
  • Multiple Updates
2021-05-04 12:11:37
  • Multiple Updates
2021-04-22 01:12:14
  • Multiple Updates
2020-05-23 13:16:55
  • Multiple Updates
2020-05-23 00:25:53
  • Multiple Updates
2016-06-28 18:12:46
  • Multiple Updates
2016-04-26 19:51:28
  • Multiple Updates
2014-02-17 10:55:42
  • Multiple Updates
2014-01-19 21:26:54
  • Multiple Updates
2013-05-10 23:26:02
  • Multiple Updates