Description
Xftp FTP Client version up to and including 3.0 (build 0238) contain a stack-based buffer overflow vulnerability triggered by a maliciously crafted PWD response from an FTP server. When the client connects to a server and receives an overly long directory string in response to the PWD command, the client fails to properly validate the length of the input before copying it into a fixed-size buffer. This results in memory corruption and allows remote attackers to execute arbitrary code on the client system.
Problem types
CWE-121 Stack-based Buffer Overflow
Product status
*
Credits
zombiefx
References
raw.githubusercontent.com/.../windows/ftp/xftp_client_pwd.rb
www.exploit-db.com/exploits/12332
www.exploit-db.com/exploits/16739
web.archive.org/...www.netsarang.com/download/down_xft3.html
www.vulncheck.com/...ftp-client-pwd-response-buffer-overflow