FTP.Client.PASV.Buffer.Overflow
Description
This indicates an attack attempt against a Buffer Overflow vulnerability in Trellian FTP clients and LeapFTP FTP client.
The vulnerability is due to an improper boundary check condition in the application when handling a malicious PASV response packet. An attacker can exploit this by tricking an unsuspecting user into visiting a malicious server and execute arbitrary code within the context of the targeted user.
Affected Products
Trellian FTP client 3.1
LeapFTP FTP client 2.7.3.600
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Refer to the vendor's Web site for suggested workaround.
http://www.trellian.com/ftp/
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2020-06-18 | 15.867 | Name:Trellian. FTP. Client. PASV. Buffer. Overflow:FTP. Client. PASV. Buffer. Overflow |