Vulnerability Description
Stack-based buffer overflow in VanDyke Software AbsoluteFTP 1.9.6 through 2.2.10 allows remote FTP servers to execute arbitrary code via a crafted file name in a LIST command response.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vandyke | Absoluteftp | 1.9.6 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/46781Vendor Advisory
- http://www.exploit-db.com/exploits/18102Exploit
- http://www.osvdb.org/77105
- http://www.saintcorporation.com/cgi-bin/exploit_info/vandyke_absoluteftp_list_cl
- http://www.securityfocus.com/bid/50614
- http://secunia.com/advisories/46781Vendor Advisory
- http://www.exploit-db.com/exploits/18102Exploit
- http://www.osvdb.org/77105
- http://www.saintcorporation.com/cgi-bin/exploit_info/vandyke_absoluteftp_list_cl
- http://www.securityfocus.com/bid/50614
FAQ
What is CVE-2011-5164?
CVE-2011-5164 is a vulnerability with a CVSS score of 9.3 (HIGH). Stack-based buffer overflow in VanDyke Software AbsoluteFTP 1.9.6 through 2.2.10 allows remote FTP servers to execute arbitrary code via a crafted file name in a LIST command response.
How severe is CVE-2011-5164?
CVE-2011-5164 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-5164?
Check the references section above for vendor advisories and patch information. Affected products include: Vandyke Absoluteftp.