Lucene search

K
certCERTVU:565580
HistoryJul 24, 2014 - 12:00 a.m.

BulletProof FTP Client 2010 is vulnerable to a stack-based buffer overflow

2014-07-2400:00:00
www.kb.cert.org
14

0.581 Medium

EPSS

Percentile

97.7%

Overview

BulletProof FTP Client 2010 is vulnerable to a stack-based buffer overflow

Description

CWE-121******-**Stack-based Buffer Overflow
BulletProof FTP Client 2010 does not check the length of the host parameter set in the quick connect bar. A long host value causes a stack-based buffer overflow, possibly allowing for arbitrary code execution.


Impact

A local attacker may be able to overwrite the stack memory causing the process to crash or create unpredictable behavior. It is possible that this vulnerability may be used to execute arbitrary code in the context of the logged in user.


Solution

The CERT/CC is currently unaware of a practical solution to this problem.


Use the Microsoft Enhanced Mitigation Experience Toolkit

The Microsoft Enhanced Mitigation Experience Toolkit (EMET) can be used to help prevent exploitation of this vulnerability. CERT/CC has created a video tutorial for setting up EMET 3.0 on Windows 7. Note that platforms that do not support ASLR, such as Windows XP and Windows Server 2003, will not receive the same level of protection that modern Windows platforms will.


Vendor Information

565580

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

BulletProof Software Affected

Updated: July 24, 2014

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base 4.3 AV:L/AC:L/Au:S/C:P/I:P/A:P
Temporal 3.9 E:POC/RL:U/RC:C
Environmental 2.9 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Gabor Seljan for reporting this vulnerability.

This document was written by Chris King.

Other Information

CVE IDs: CVE-2014-2973
Date Public: 2014-07-24 Date First Published:

0.581 Medium

EPSS

Percentile

97.7%