vendor:
Matu FTP Client
by:
Kanatoko
7.5
CVSS
HIGH
Stack-Based Overflow
119
CWE
Product Name: Matu FTP Client
Affected Version From: 1.74
Affected Version To: 1.74
Patch Exists: YES
Related CWE: N/A
CPE: a:matu_ftp:matu_ftp:1.74
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 2000 Professional (SP2)
2002
Matu FTP Client Stack-Based Overflow Vulnerability
An issue has been reported which could allow for a malicious ftp server to execute arbitrary code on a Matu FTP client. If,upon user connection, a FTP server '220' response is of excessive length, a stack-based overflow condition could occur. This overflow could overwrite stack variables and be used to execute arbitrary code. However, sending random data could cause the application to crash.
Mitigation:
Ensure that the FTP server is configured to limit the length of the '220' response.