FTP.Banner.Parsing.Buffer.Overflow
Description
This indicates a possible exploit of a buffer overflow vulnerability in moxftp.
The vulnerability is caused by an error when the vulnerable software handles over-long ftp banner. It could allow malicious FTP server to execute arbitrary code by sending a crafted ftp banner.
Affected Products
moxftp 2.2 and earlier.
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply appropriate patch from the vendor.
xftp xftp 2.2
* Debian xftp_2.2-13.1_alpha.deb
Debian GNU/Linux 2.2 alias potato
* Debian xftp_2.2-13.1_arm.deb
Debian GNU/Linux 2.2 alias potato
* Debian xftp_2.2-13.1_i386.deb
Debian GNU/Linux 2.2 alias potato
* Debian xftp_2.2-13.1_m68k.deb
Debian GNU/Linux 2.2 alias potato
* Debian xftp_2.2-13.1_powerpc.deb
Debian GNU/Linux 2.2 alias potato
* Debian xftp_2.2-13.1_sparc.deb
Debian GNU/Linux 2.2 alias potato
* Debian xftp_2.2-18.1_alpha.deb
* Debian xftp_2.2-18.1_arm.deb
* Debian xftp_2.2-18.1_hppa.deb
* Debian xftp_2.2-18.1_i386.deb
* Debian xftp_2.2-18.1_ia64.deb
* Debian xftp_2.2-18.1_m68k.deb
* Debian xftp_2.2-18.1_mips.deb
* Debian xftp_2.2-18.1_mipsel.deb
* Debian xftp_2.2-18.1_powerpc.deb
* Debian xftp_2.2-18.1_s390.deb
* Debian xftp_2.2-18.1_sparc.deb
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2020-08-06 | 15.901 | Sig Added |