Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-23ff-vxpg-784h

Опубликовано: 21 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.3

Описание

Xftp FTP Client version up to and including 3.0 (build 0238) contain a stack-based buffer overflow vulnerability triggered by a maliciously crafted PWD response from an FTP server. When the client connects to a server and receives an overly long directory string in response to the PWD command, the client fails to properly validate the length of the input before copying it into a fixed-size buffer. This results in memory corruption and allows remote attackers to execute arbitrary code on the client system.

Xftp FTP Client version up to and including 3.0 (build 0238) contain a stack-based buffer overflow vulnerability triggered by a maliciously crafted PWD response from an FTP server. When the client connects to a server and receives an overly long directory string in response to the PWD command, the client fails to properly validate the length of the input before copying it into a fixed-size buffer. This results in memory corruption and allows remote attackers to execute arbitrary code on the client system.

EPSS

Процентиль: 98%
0.59033
Средний

9.3 Critical

CVSS4

Дефекты

CWE-121

Связанные уязвимости

nvd
2 месяца назад

Xftp FTP Client version up to and including 3.0 (build 0238) contain a stack-based buffer overflow vulnerability triggered by a maliciously crafted PWD response from an FTP server. When the client connects to a server and receives an overly long directory string in response to the PWD command, the client fails to properly validate the length of the input before copying it into a fixed-size buffer. This results in memory corruption and allows remote attackers to execute arbitrary code on the client system.

EPSS

Процентиль: 98%
0.59033
Средний

9.3 Critical

CVSS4

Дефекты

CWE-121