FTP.Client.PASV.Buffer.Overflow

description-logoDescription

This indicates an attack attempt against a Buffer Overflow vulnerability in Trellian FTP clients and LeapFTP FTP client.
The vulnerability is due to an improper boundary check condition in the application when handling a malicious PASV response packet. An attacker can exploit this by tricking an unsuspecting user into visiting a malicious server and execute arbitrary code within the context of the targeted user.

affected-products-logoAffected Products

Trellian FTP client 3.1
LeapFTP FTP client 2.7.3.600

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Refer to the vendor's Web site for suggested workaround.
http://www.trellian.com/ftp/

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-06-18 15.867 Name:Trellian.
FTP.
Client.
PASV.
Buffer.
Overflow:FTP.
Client.
PASV.
Buffer.
Overflow