FileZilla Client < 3.7.2 SFTP Integer Overflow

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an application that is affected by a
remote integer overflow vulnerability.

Description :

The version of FileZilla Client on the remote host is a version prior
to 3.7.2. As such, it is affected by an integer overflow vulnerability
that exists in the 'getstring()' function from PuTTY used to handle
SFTP. This can lead to a heap overflow during the SSH handshake prior
to authentication, due to improper bounds checking of the length
parameter received from the SFTP server. An attacker could exploit this
issue by tricking a user into connecting to a specially crafted SFTP
server. This could lead to a denial of service, and potentially code
execution.

See also :

http://www.search-lab.hu/advisories/secadv-20130722
https://filezilla-project.org/

Solution :

Upgrade to FileZilla Client 3.7.2 or later.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 69476 ()

Bugtraq ID: 61599

CVE ID: CVE-2013-4852

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now