Vulnerability Description
Xftp FTP Client version up to and including 3.0 (build 0238) contain a stack-based buffer overflow vulnerability triggered by a maliciously crafted PWD response from an FTP server. When the client connects to a server and receives an overly long directory string in response to the PWD command, the client fails to properly validate the length of the input before copying it into a fixed-size buffer. This results in memory corruption and allows remote attackers to execute arbitrary code on the client system.
Related Weaknesses (CWE)
References
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://web.archive.org/web/20090312072219/http://www.netsarang.com/download/dow
- https://www.exploit-db.com/exploits/12332
- https://www.exploit-db.com/exploits/16739
- https://www.vulncheck.com/advisories/xftp-ftp-client-pwd-response-buffer-overflo
FAQ
What is CVE-2010-20122?
CVE-2010-20122 is a documented vulnerability. Xftp FTP Client version up to and including 3.0 (build 0238) contain a stack-based buffer overflow vulnerability triggered by a maliciously crafted PWD response from an FTP server. When the client con...
How severe is CVE-2010-20122?
CVSS scoring is not yet available for CVE-2010-20122. Check NVD for updates.
Is there a patch for CVE-2010-20122?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.