BulletProof.FTP.Client.BPS.File.Stack.Buffer.Overflow
Description
This indicates an attack attempt against a Buffer Overflow vulnerability in BulletProof FTP Client.
The vulnerability is caused by the application's failure to perform adequate boundary checks on user supplied data. An attacker may exploit this issue to execute arbitrary code in the context of the vulnerable application.
Affected Products
BulletProof FTP 2.63 build 56
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Currently we are not aware of any vendor supplied patch for this issue.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2020-07-22 | 15.892 | Sig Added |