BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

Trellian FTP Client Buffer Overflow

Disclosed April 12, 2010    Zeroday : 1564 days

Vulnerability Description:

Trellian FTP Client is vulnerable to a buffer overflow that occurs when handling a long PASV message.

Vendors:

Trellian

Vulnerable Software/Devices:

Trellian FTP Client 3.1.3.1789

Vulnerability Severity:

High

Exploit Availability:

Publicly Available

Exploit Impact:

Remote Code Execution
Exploitation of this vulnerability is possible by forming a malicious request and sending it to the affected client. Remote attackers who successfully exploit this vulnerability will be able to execute arbitrary commands on the vulnerable system with the same rights as the web service.

BeyondTrust Prevention and Detection:

BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

  • 31955 - Trellian FTP Client Buffer Overflow (Zero-Day)
  • 31956 - Trellian FTP Client Buffer Overflow (Zero-Day) - x64

Mitigation:

No mitigation exists.

Links:

CVE(s):