Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rw23-m73v-8343

Опубликовано: 20 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 1.1
CVSS3: 4.5

Описание

A weakness has been identified in bftpd up to 6.2. Impacted is the function expand_groups of the file options.c of the component Configuration File Handler. Executing manipulation can lead to heap-based buffer overflow. It is possible to launch the attack on the local host. Attacks of this nature are highly complex. The exploitability is considered difficult. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

A weakness has been identified in bftpd up to 6.2. Impacted is the function expand_groups of the file options.c of the component Configuration File Handler. Executing manipulation can lead to heap-based buffer overflow. It is possible to launch the attack on the local host. Attacks of this nature are highly complex. The exploitability is considered difficult. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 4%
0.00019
Низкий

1.1 Low

CVSS4

4.5 Medium

CVSS3

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 4.5
nvd
4 месяца назад

A weakness has been identified in bftpd up to 6.2. Impacted is the function expand_groups of the file options.c of the component Configuration File Handler. Executing manipulation can lead to heap-based buffer overflow. It is possible to launch the attack on the local host. Attacks of this nature are highly complex. The exploitability is considered difficult. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 4%
0.00019
Низкий

1.1 Low

CVSS4

4.5 Medium

CVSS3

Дефекты

CWE-119