Home

Description

Seagull FTP Client <= v3.3 Build 409 contains a stack-based buffer overflow vulnerability in its FTP directory listing parser. When the client connects to an FTP server and receives a crafted response to a LIST command containing an excessively long filename, the application fails to properly validate input length, resulting in a buffer overflow that overwrites the Structured Exception Handler (SEH). This may allow remote attackers to execute arbitrary code on the client system. This product line was discontinued and users were advised to use BlueZone Secure FTP instead, at the time of disclosure.

PUBLISHED Reserved 2025-08-19 | Published 2025-08-21 | Updated 2025-08-22 | Assigner VulnCheck




HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unaffected

*
affected

Credits

corelanc0d3r of Corelan Team finder

References

raw.githubusercontent.com/...ndows/ftp/seagull_list_reply.rb exploit

www.exploit-db.com/exploits/16705 exploit

web.archive.org/...ex.php/2010/10/12/death-of-an-ftp-client/ technical-description exploit

web.archive.org/...d-file-transfer/bz-secure-ftp/at-a-glance product

www3.rocketsoftware.com/bluezone/help/v34/sftp/sftp.htm product

www.vulncheck.com/...ories/seagull-ftp-stack-buffer-overflow third-party-advisory

cve.org (CVE-2010-20007)

nvd.nist.gov (CVE-2010-20007)

Download JSON