vendor:
BulletProof FTP Client
by:
Rafael Sousa
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: BulletProof FTP Client
Affected Version From: 2.63 build 56
Affected Version To: 2.63 build 56
Patch Exists: Yes
Related CWE: N/A
CPE: a:bulletproof_software:bulletproof_ftp_client
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2020
Buffer Overflow in BulletProof FTP Client
A buffer overflow vulnerability exists in BulletProof FTP Client v. 2.63 build 56 and possibly older versions. The vulnerability is caused due to a boundary error when handling Session-File (.bps) files. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a specially crafted .bps file. Successful exploitation may allow execution of arbitrary code.
Mitigation:
Upgrade to the latest version of BulletProof FTP Client