header-logo
Suggest Exploit
vendor:
FTPRush
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: FTPRush
Affected Version From: 1.0.0.610
Affected Version To: 1.0.0.610
Patch Exists: Yes
Related CWE: N/A
CPE: a:ftprush:ftprush:1.0.0.610
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

FTPRush Local Buffer-Overflow Vulnerability

FTPRush is prone to a local buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input data to an insufficiently sized buffer. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in denial-of-service conditions.

Mitigation:

Upgrade to the latest version of FTPRush
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/21714/info

FTPRush is prone to a local buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input data to an insufficiently sized buffer.

An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in denial-of-service conditions.

This issue affects version 1.0.0.610; other versions may also be vulnerable.

Supplying the following to the client GUI is sufficient to demonstrate this issue:

Host: 4131 x "A"