GlobalScape CuteFTP LIST Response...

- AV AC AU C I A
发布: 2003-01-18
修订: 2025-04-13

A buffer overflow condition has been reported for the CuteFTP application. The vulnerability is due to insufficient bounds checking performed on certain FTP command responses. If CuteFTP is used to connect to a malicious FTP server that sends an overly long response to the LIST command, the buffer overflow condition will be triggered. Code execution may be possible. ** CuteFTP 5.0 build 51.1.23.1 was reported to still be vulnerable to this issue. For this build, 780 bytes of data are required to overflow the buffer rather than 257 bytes.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息