Vulnerability Description
Arcane Software’s Vermillion FTP Daemon (vftpd) versions up to and including 1.31 contains a memory corruption vulnerability triggered by a malformed FTP PORT command. The flaw arises from an out-of-bounds array access during input parsing, allowing an attacker to manipulate stack memory and potentially execute arbitrary code. Exploitation requires direct access to the FTP service and is constrained by a single execution attempt if the daemon is installed as a Windows service.
Related Weaknesses (CWE)
References
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://web.archive.org/web/20100213162028/http://www.softsea.com/review/Vermill
- https://web.archive.org/web/20100416140657/http://www.global-evolution.info/news
- https://www.broadcom.com/support/security-center/attacksignatures/detail?asid=23
- https://www.exploit-db.com/exploits/11293
- https://www.juniper.net/us/en/threatlabs/ips-signatures/detail.FTP:EXPLOIT:VERMI
- https://www.vulncheck.com/advisories/vermillion-ftp-daemon-port-command-memory-c
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://www.exploit-db.com/exploits/11293
FAQ
What is CVE-2010-20115?
CVE-2010-20115 is a documented vulnerability. Arcane Software’s Vermillion FTP Daemon (vftpd) versions up to and including 1.31 contains a memory corruption vulnerability triggered by a malformed FTP PORT command. The flaw arises from an out-of-b...
How severe is CVE-2010-20115?
CVSS scoring is not yet available for CVE-2010-20115. Check NVD for updates.
Is there a patch for CVE-2010-20115?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.