Description
Arcane Software’s Vermillion FTP Daemon (vftpd) versions up to and including 1.31 contains a memory corruption vulnerability triggered by a malformed FTP PORT command. The flaw arises from an out-of-bounds array access during input parsing, allowing an attacker to manipulate stack memory and potentially execute arbitrary code. Exploitation requires direct access to the FTP service and is constrained by a single execution attempt if the daemon is installed as a Windows service.
Problem types
CWE-704 Incorrect Type Conversion or Cast
Product status
*
Credits
x4lt of Global-Evolution Security Group
References
raw.githubusercontent.com/...ows/ftp/vermillion_ftpd_port.rb
www.exploit-db.com/exploits/11293
www.broadcom.com/...enter/attacksignatures/detail?asid=23681
www.juniper.net/...etail.FTP:EXPLOIT:VERMILLION-PORT-OF.html
web.archive.org/...evolution.info/news/files/vftpd/vftpd.txt
web.archive.org/...sea.com/review/Vermillion-FTP-Daemon.html
www.vulncheck.com/...p-daemon-port-command-memory-corruption