Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4j68-mmq7-4c57

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple buffer overflows in SmartFTP 1.0.973, and other versions before 1.0.976, allow remote attackers to execute arbitrary code via (1) a long response to a PWD command, which triggers a stack-based overflow, and (2) a long line in a response to a file LIST command, which triggers a heap-based overflow.

Multiple buffer overflows in SmartFTP 1.0.973, and other versions before 1.0.976, allow remote attackers to execute arbitrary code via (1) a long response to a PWD command, which triggers a stack-based overflow, and (2) a long line in a response to a file LIST command, which triggers a heap-based overflow.

EPSS

Процентиль: 96%
0.27898
Средний

Связанные уязвимости

nvd
около 22 лет назад

Multiple buffer overflows in SmartFTP 1.0.973, and other versions before 1.0.976, allow remote attackers to execute arbitrary code via (1) a long response to a PWD command, which triggers a stack-based overflow, and (2) a long line in a response to a file LIST command, which triggers a heap-based overflow.

EPSS

Процентиль: 96%
0.27898
Средний