Description
SpotFTP 3.0.0.0 contains a denial of service vulnerability in the registration name input field that allows attackers to crash the application. Attackers can generate a 1000-character buffer payload and paste it into the 'Name' field to trigger an application crash.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
Ismail Tasdelen
References
www.exploit-db.com/exploits/47868 (ExploitDB-47868)
www.nsauditor.com/ (Vendor Homepage)
www.vulncheck.com/...assword-recovery-name-denial-of-service (VulnCheck Advisory: SpotFTP FTP Password Recovery 3.0.0.0 - 'Name' Denial of Service)