vendor:
BulletProof FTP (Client)
by:
h07
9,3
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: BulletProof FTP (Client)
Affected Version From: V2.45
Affected Version To: V2.45
Patch Exists: YES
Related CWE: N/A
CPE: a:bpftp:bulletproof_ftp_client
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 2000 SP4 Polish
2006
BulletProof FTP (Client) V2.45 0day Buffer Overflow PoC Exploit
A buffer overflow vulnerability exists in BulletProof FTP (Client) V2.45. The vulnerability is caused due to a boundary error within the handling of FTP requests. This can be exploited to cause a stack-based buffer overflow by sending an overly long, specially-crafted string to the affected server. Successful exploitation allows execution of arbitrary code.
Mitigation:
Upgrade to the latest version of BulletProof FTP (Client) V2.45