Vulnerability CVE-2018-7573


Published: 2018-03-01

Description:
An issue was discovered in FTPShell Client 6.7. A remote FTP server can send 400 characters of 'F' in conjunction with the FTP 220 response code to crash the application; after this overflow, one can run arbitrary code on the victim machine. This is similar to CVE-2009-3364 and CVE-2017-6465.

See advisories in our WLB2 database:
Topic
Author
Date
High
FTPShell Client v6.7 Buffer Overflow
Ali Abdollahi
01.03.2018

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Ftpshell -> Ftpshell client 

 References:
https://cxsecurity.com/issue/WLB-2018030011
https://www.exploit-db.com/exploits/44596/
https://www.exploit-db.com/exploits/44968/

Copyright 2024, cxsecurity.com

 

Back to Top