Description
Xlight FTP Server 3.9.1 contains a structured exception handler (SEH) overwrite vulnerability that allows local attackers to crash the application and overwrite SEH pointers by supplying a crafted buffer string. Attackers can inject a 428-byte payload through the program execution field in virtual server configuration to trigger a buffer overflow that corrupts the SEH chain and enables potential code execution.
Problem types
Product status
Credits
Logan Whitmire
References
www.exploit-db.com/exploits/46458 (ExploitDB-46458)
www.xlightftpd.com/index.htm (Official Product Homepage)
www.xlightftpd.com/download/xlight.zip (Product Reference)
www.vulncheck.com/...tp-server-seh-overwrite-buffer-overflow (VulnCheck Advisory: Xlight FTP Server 3.9.1 SEH Overwrite Buffer Overflow)