Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fh65-c5x2-5936

Опубликовано: 20 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.3

Описание

LeapFTP < 3.1.x contains a stack-based buffer overflow vulnerability in its FTP client parser. When the client receives a directory listing containing a filename longer than 528 bytes, the application fails to properly bound-check the input and overwrites the Structured Exception Handler (SEH) chain. This allows an attacker operating a malicious FTP server to execute arbitrary code on the victim’s machine when the file is listed or downloaded.

LeapFTP < 3.1.x contains a stack-based buffer overflow vulnerability in its FTP client parser. When the client receives a directory listing containing a filename longer than 528 bytes, the application fails to properly bound-check the input and overwrites the Structured Exception Handler (SEH) chain. This allows an attacker operating a malicious FTP server to execute arbitrary code on the victim’s machine when the file is listed or downloaded.

EPSS

Процентиль: 98%
0.50127
Средний

9.3 Critical

CVSS4

Дефекты

CWE-121

Связанные уязвимости

nvd
6 месяцев назад

LeapFTP < 3.1.x contains a stack-based buffer overflow vulnerability in its FTP client parser. When the client receives a directory listing containing a filename longer than 528 bytes, the application fails to properly bound-check the input and overwrites the Structured Exception Handler (SEH) chain. This allows an attacker operating a malicious FTP server to execute arbitrary code on the victim’s machine when the file is listed or downloaded.

EPSS

Процентиль: 98%
0.50127
Средний

9.3 Critical

CVSS4

Дефекты

CWE-121