This exploit takes advantage of a buffer overflow vulnerability in FTPShell Client 4.1 RC2. By sending a malicious pasv response, an attacker can trigger the buffer overflow and potentially execute arbitrary code on the target system. The exploit has been tested on Windows XP SP3 and Windows 2000 SP4.
This exploit targets the FTPShell Client version 4.1 RC2 on Windows XP SP3. It exploits a stack overflow vulnerability in the 'Name Session' feature of the program. The exploit code contains a shellcode for executing the 'calc.exe' program. The exploit is coded by 'zec' and can be contacted at zec@bsdmail.com.