BulletProof.FTP.Client.BPS.File.Stack.Buffer.Overflow

description-logoDescription

This indicates an attack attempt against a Buffer Overflow vulnerability in BulletProof FTP Client.
The vulnerability is caused by the application's failure to perform adequate boundary checks on user supplied data. An attacker may exploit this issue to execute arbitrary code in the context of the vulnerable application.

affected-products-logoAffected Products

BulletProof FTP 2.63 build 56

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Currently we are not aware of any vendor supplied patch for this issue.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-07-22 15.892 Sig Added