vendor:
FTPShell Client
by:
Sebastián Castro
9.8
CVSS
CRITICAL
Buffer Overflow
119
CWE
Product Name: FTPShell Client
Affected Version From: 6.7
Affected Version To: 6.7
Patch Exists: YES
Related CWE: CVE-2018-7573
CPE: a:ftpshell:ftpshell_client:6.7
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows Server 2008 R2 x64, Windows 7 SP1 x64, Windows XP SP3 x86.
2018
FTPShell Client 6.7 – Remote Buffer Overflow
A buffer overflow vulnerability exists in FTPShell Client 6.7, which could allow an attacker to execute arbitrary code on the target system. The vulnerability is due to a lack of proper validation of user-supplied data, which can result in a stack-based buffer overflow. An attacker can exploit this vulnerability by sending a specially crafted FTP request to the vulnerable server. Successful exploitation of this vulnerability could result in arbitrary code execution in the context of the application.
Mitigation:
Upgrade to the latest version of FTPShell Client 6.7 or later.