Vulnerability Description
Buffer Overflow vulnerability in RaidenFTPD 2.4.4005 allows a local attacker to execute arbitrary code via the Server name field of the Step by step setup wizard.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Raidenftpd | Raidenftpd | 2.4.4050 |
Related Weaknesses (CWE)
References
- https://github.com/AndreGNogueira/CVE-2023-39063ExploitThird Party Advisory
- https://github.com/AndreGNogueira/CVE-2023-39063ExploitThird Party Advisory
FAQ
What is CVE-2023-39063?
CVE-2023-39063 is a vulnerability with a CVSS score of 7.8 (HIGH). Buffer Overflow vulnerability in RaidenFTPD 2.4.4005 allows a local attacker to execute arbitrary code via the Server name field of the Step by step setup wizard.
How severe is CVE-2023-39063?
CVE-2023-39063 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-39063?
Check the references section above for vendor advisories and patch information. Affected products include: Raidenftpd Raidenftpd.