Reported June 09, 2003, by ::Operash::.

 

 

VERSIONS AFFECTED

 

  • FlashFXP FTP Client for Windows version 2.0 build 905

 

DESCRIPTION

 

<span style="font-family:Verdana">Two buffer-overflow vulnerabilities in FlashFXP FTP Client for Windows can result in the execution of arbitrary code on the vulnerable computer. These two vulnerabilities consist of the following:</h3> <span style="font-family:Verdana"> </h3> <span style="font-family: Symbol">·<span style='font:7.0pt "Times New Roman"'>         </h3></h3><span style="font-family:Verdana">A buffer overflow occurs on the stack area if a server replies to a PASV command request with a long string. If a user connects to a malicious server, an attacker can exploit the vulnerability to execute arbitrary code on the vulnerable system. </h3> <span style="font-family:Verdana"> </h3> <span style="font-family: Symbol">·<span style='font:7.0pt "Times New Roman"'>         </h3></h3><span style="font-family:Verdana">A buffer overflow occurs on the stack area if a long host name is specified as destination server. If a user copies a malicious manipulated URL with the Clipboard Monitor function enabled, an attacker can exploit the vulnerability to execute arbitrary code on the vulnerable system.</h3> <span style="font-family:Verdana"> </h3>

VENDOR RESPONSE

<b><span style="font-family:Verdana;
color:purple"> </h3></b>
<span style="font-family:
Verdana"><a href="http://www.flashfxp.com/" style="color: blue; text-decoration: underline; text-underline: single">FlashFXP</a> has released <a href="http://www.flashfxp.com/download.php" style="color: blue; text-decoration: underline; text-underline: single">version 2.1</a>, which doesn't contain these vulnerabilities.</h3>

 

CREDIT                                                                                                       
Discovered by :: Operash ::.