Multiple buffer overflows in SmartFTP 1.0.973, and other versions before 1.0.976, allow remote attackers to execute arbitrary code via (1) a long response to a PWD command, which triggers a stack-based overflow, and (2) a long line in a response to a file LIST command, which triggers a heap-based overflow.
References
| Link | Resource |
|---|---|
| http://archives.neohapsis.com/archives/bugtraq/2003-06/0083.html | Vendor Advisory |
| http://security.nnov.ru/docs4679.html | Vendor Advisory |
| http://www.securityfocus.com/bid/7858 | Patch |
| http://www.securityfocus.com/bid/7861 | Patch |
| http://securitytracker.com/id?1006956 | Vendor Advisory |
| http://secunia.com/advisories/8998 | Patch Vendor Advisory |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/12231 | |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/12228 |
Configurations
Information
Published : 2003-12-30 21:00
Updated : 2017-07-28 18:29
NVD link : CVE-2003-1319
Mitre link : CVE-2003-1319
JSON object : View
CWE
Products Affected
smartftp
- smartftp


