Логотип exploitDog
bind:CVE-2020-5204
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-5204

Количество 3

Количество 3

nvd логотип

CVE-2020-5204

около 6 лет назад

In uftpd before 2.11, there is a buffer overflow vulnerability in handle_PORT in ftpcmd.c that is caused by a buffer that is 16 bytes large being filled via sprintf() with user input based on the format specifier string %d.%d.%d.%d. The 16 byte size is correct for valid IPv4 addresses (len('255.255.255.255') == 16), but the format specifier %d allows more than 3 digits. This has been fixed in version 2.11

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0069-1

около 6 лет назад

Security update for uftpd

EPSS: Низкий
github логотип

GHSA-4g9j-24m6-cjw4

больше 3 лет назад

In uftpd before 2.11, there is a buffer overflow vulnerability in handle_PORT in ftpcmd.c that is caused by a buffer that is 16 bytes large being filled via sprintf() with user input based on the format specifier string %d.%d.%d.%d. The 16 byte size is correct for valid IPv4 addresses (len('255.255.255.255') == 16), but the format specifier %d allows more than 3 digits. This has been fixed in version 2.11

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-5204

In uftpd before 2.11, there is a buffer overflow vulnerability in handle_PORT in ftpcmd.c that is caused by a buffer that is 16 bytes large being filled via sprintf() with user input based on the format specifier string %d.%d.%d.%d. The 16 byte size is correct for valid IPv4 addresses (len('255.255.255.255') == 16), but the format specifier %d allows more than 3 digits. This has been fixed in version 2.11

CVSS3: 6.5
1%
Низкий
около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0069-1

Security update for uftpd

1%
Низкий
около 6 лет назад
github логотип
GHSA-4g9j-24m6-cjw4

In uftpd before 2.11, there is a buffer overflow vulnerability in handle_PORT in ftpcmd.c that is caused by a buffer that is 16 bytes large being filled via sprintf() with user input based on the format specifier string %d.%d.%d.%d. The 16 byte size is correct for valid IPv4 addresses (len('255.255.255.255') == 16), but the format specifier %d allows more than 3 digits. This has been fixed in version 2.11

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу