Xftp < 3.0 Build 242 LIST Response Buffer Overflow

high Nessus Plugin ID 47701

Language:

Synopsis

The remote host contains an application that is affected by a buffer overflow vulnerability.

Description

The version of Xftp, an FTP client for Windows, installed on the remote host is older than 3.0 Build 242. Such versions are reportedly affected by a buffer overflow vulnerability.

By tricking a user into double-clicking on a file name included in the 'LIST' command response from a malicious FTP server, it may be possible for the attacker to trigger a denial of service condition or to execute arbitrary code on the affected host .

Solution

Upgrade to Xftp 3.0 Build 243 or later.

See Also

http://www.nessus.org/u?68896026

http://www.netsarang.com/products/xft_update.html

Plugin Details

Severity: High

ID: 47701

File Name: xftp_3_242.nasl

Version: Revision: 1.5

Type: local

Agent: windows

Family: Windows

Published: 7/12/2010

Updated: 1/12/2015

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/31/2010

Vulnerability Publication Date: 5/31/2010

Reference Information

BID: 40470

Secunia: 39554