Problem në CuteFTP client - 01/20/03
According to Secunia -at
http://www.secunia.com/advisories/7898/ - a vulnerability has been discovered in the CuteFTP 5.0 XP client, which could allow arbitrary
code to be run on the affected computer.
This security flaw lies in the fact that CuteFTP does not correctly check input data. When listing directories using the LIST command, the plication
expects a response of no more than 256 bytes. If a bigger response is returned, this causes a buffer overflow.
This vulnerability could be exploited to allow arbitrary code to be run on the affected computer.
cheers
mySteRioUs
According to Secunia -at
http://www.secunia.com/advisories/7898/ - a vulnerability has been discovered in the CuteFTP 5.0 XP client, which could allow arbitrary
code to be run on the affected computer.
This security flaw lies in the fact that CuteFTP does not correctly check input data. When listing directories using the LIST command, the plication
expects a response of no more than 256 bytes. If a bigger response is returned, this causes a buffer overflow.
This vulnerability could be exploited to allow arbitrary code to be run on the affected computer.
cheers
mySteRioUs