vendor:
NICO-FTP
by:
Miguel Mendez Z
7.8
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: NICO-FTP
Affected Version From: 3.0.1.19
Affected Version To: 3.0.1.19
Patch Exists: YES
Related CWE: N/A
CPE: a:nico-ftp:nico-ftp:3.0.1.19
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows XP_sp3 [es]/ Windows 7_x86 [eng]
2018
NICO-FTP 3.0.1.19 – Buffer Overflow (SEH)(ASLR)
A buffer overflow vulnerability exists in NICO-FTP 3.0.1.19 which allows an attacker to execute arbitrary code by sending a specially crafted payload to the vulnerable application. The vulnerability is caused due to a boundary error when handling user-supplied input, specifically when handling the 'Sites.conf' file. This can be exploited to cause a stack-based buffer overflow by sending a specially crafted payload to the vulnerable application. Successful exploitation of this vulnerability could result in arbitrary code execution in the context of the application.
Mitigation:
Upgrade to the latest version of NICO-FTP 3.0.1.19 or apply the appropriate patch.