LibFTP Multiple Remote Buffer Overflow Vulnerabilities
BID:22987
Info
LibFTP Multiple Remote Buffer Overflow Vulnerabilities
| Bugtraq ID: | 22987 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2007-1470 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 15 2007 12:00AM |
| Updated: | May 12 2015 07:33PM |
| Credit: | starcadi is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
libftp libftp 5.0 |
| Not Vulnerable: | |
Discussion
LibFTP Multiple Remote Buffer Overflow Vulnerabilities
The 'libftp' library is prone to multiple remote buffer-overflow vulnerabilities because the software fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.
An attacker can exploit these issues to execute arbitrary code within the context of applications that rely on the affected library. Failed exploit attempts will result in a denial of service.
Version 5.0 of libftp is vulnerable; other versions may also be affected.
The 'libftp' library is prone to multiple remote buffer-overflow vulnerabilities because the software fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.
An attacker can exploit these issues to execute arbitrary code within the context of applications that rely on the affected library. Failed exploit attempts will result in a denial of service.
Version 5.0 of libftp is vulnerable; other versions may also be affected.
Exploit / POC
LibFTP Multiple Remote Buffer Overflow Vulnerabilities
Currently we are not aware of any exploits for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently we are not aware of any exploits for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
LibFTP Multiple Remote Buffer Overflow Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].