Vulnerability Description
Stack-based buffer overflow in BulletProof FTP Client 2.63 and 2010 allows user-assisted attackers to execute arbitrary code via a bookmark file entry with a long host name, which appears as a host parameter within the quick-connect bar.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bpftp | Bulletproof Ftp Client | 2.63 |
Related Weaknesses (CWE)
References
- http://osvdb.org/50968
- http://packetstormsecurity.com/files/131965/BulletProof-FTP-Client-2010-Buffer-OExploit
- http://secunia.com/advisories/33322
- http://securityreason.com/securityalert/4835
- http://www.kb.cert.org/vuls/id/565580Third Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/33007Exploit
- https://www.exploit-db.com/exploits/37056/
- https://www.exploit-db.com/exploits/7571
- http://osvdb.org/50968
- http://packetstormsecurity.com/files/131965/BulletProof-FTP-Client-2010-Buffer-OExploit
- http://secunia.com/advisories/33322
- http://securityreason.com/securityalert/4835
- http://www.kb.cert.org/vuls/id/565580Third Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/33007Exploit
- https://www.exploit-db.com/exploits/37056/
FAQ
What is CVE-2008-5753?
CVE-2008-5753 is a vulnerability with a CVSS score of 9.3 (HIGH). Stack-based buffer overflow in BulletProof FTP Client 2.63 and 2010 allows user-assisted attackers to execute arbitrary code via a bookmark file entry with a long host name, which appears as a host pa...
How severe is CVE-2008-5753?
CVE-2008-5753 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-5753?
Check the references section above for vendor advisories and patch information. Affected products include: Bpftp Bulletproof Ftp Client.