BlackJumboDog contains buffer overflow vulnerability

ID VU:714584
Type cert
Reporter CERT
Modified 2005-04-14T00:00:00



BlackJumboDog fails to verify the length of several FTP commands, creating a buffer overflow vulnerability. Exploitation of this vulnerability may result in code execution on the target system with privileges of the FTP service.


BlackJumboDog is a multi-function server for Microsoft Windows, providing FTP, email, web, and proxy services. Version 3.6.1 contains a buffer overflow vulnerability. BlackJumboDog fails to check the length of FTP commands passed to it. Using specially crafted FTP commands, a remote user can trigger a buffer overflow condition and possibly execute code on the server.


A remote attacker may be able to exploit this vulnerability to compromise the BlackJumboDog system.


This issue has been resolved in version 3.6.2 of BlackJumboDog.

Systems Affected

Vendor| Status| Date Notified| Date Updated
SapporoWorks| | -| 03 Aug 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A


  • <>
  • <>


Thanks to Secunia, Tan Chew Keong, and SIG^2 for the information contained in their security advisories

This document was written by Will Dormann.

Other Information

  • CVE IDs: Unknown
  • Date Public: 02 Aug 2004
  • Date First Published: 03 Aug 2004
  • Date Last Updated: 14 Apr 2005
  • Severity Metric: 3.37
  • Document Revision: 14