11 lines
No EOL
574 B
Text
11 lines
No EOL
574 B
Text
source: https://www.securityfocus.com/bid/21714/info
|
|
|
|
FTPRush is prone to a local buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input data to an insufficiently sized buffer.
|
|
|
|
An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in denial-of-service conditions.
|
|
|
|
This issue affects version 1.0.0.610; other versions may also be vulnerable.
|
|
|
|
Supplying the following to the client GUI is sufficient to demonstrate this issue:
|
|
|
|
Host: 4131 x "A" |