FlashFXP PWD Command Remote Buffer Overflow Vulnerability
BID:22433
Info
FlashFXP PWD Command Remote Buffer Overflow Vulnerability
| Bugtraq ID: | 22433 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2007-0825 |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 06 2007 12:00AM |
| Updated: | May 12 2015 07:34PM |
| Credit: | Marsu is credited with the discovery of this vulnerability. |
| Vulnerable: |
FlashFXP FlashFXP 3.4.0 build 1145 |
| Not Vulnerable: | |
Discussion
FlashFXP PWD Command Remote Buffer Overflow Vulnerability
FlashFXP is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer.
An attacker can exploit this issue to cause the application to consume excessive CPU resources, denying service to legitimate users. Due to the nature of this issue, the attacker may be able to execute arbitrary code within the context of the affected application.
This issue affects version 3.4.0 build 1145; other versions may also be affected.
FlashFXP is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer.
An attacker can exploit this issue to cause the application to consume excessive CPU resources, denying service to legitimate users. Due to the nature of this issue, the attacker may be able to execute arbitrary code within the context of the affected application.
This issue affects version 3.4.0 build 1145; other versions may also be affected.
Exploit / POC
FlashFXP PWD Command Remote Buffer Overflow Vulnerability
The following proof of concept demonstrates this issue:
The following proof of concept demonstrates this issue:
Solution / Fix
FlashFXP PWD Command Remote Buffer Overflow Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].