vendor:
BulletProof FTP Client
by:
Gabor Seljan
7.8
CVSS
HIGH
Stack-based buffer overflow
119
CWE
Product Name: BulletProof FTP Client
Affected Version From: BulletProof FTP Client 2010
Affected Version To: BulletProof FTP Client 2010
Patch Exists: YES
Related CWE: CVE-2014-2973
CPE: a:bpftp:bulletproof_ftp_client
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/fileformat/bpftp_client_bps_bof, https://www.infosecmatter.com/nessus-plugin-library/?id=79547, https://www.infosecmatter.com/list-of-metasploit-windows-exploits-detailed-spreadsheet/, https://www.infosecmatter.com/nessus-plugin-library/?id=75779, https://www.infosecmatter.com/nessus-plugin-library/?id=129182, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/multi/http/dexter_casinoloader_exec
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3
2014
BulletProof FTP Client BPS Buffer Overflow
This module exploits a stack-based buffer overflow vulnerability in BulletProof FTP Client 2010, caused by an overly long hostname. By persuading the victim to open a specially-crafted .BPS file, a remote attacker could execute arbitrary code on the system or cause the application to crash. This module has been tested successfully on Windows XP SP3.
Mitigation:
Update to the latest version of BulletProof FTP Client