FlashFXP < 4.2.0.1730 ListIndex TListBox Handling Remote Overflow

high Nessus Plugin ID 60111

Synopsis

The remote host has an FTP client that is affected by a buffer overflow vulnerability.

Description

The remote host is running a version of FlashFXP prior to 4.2.0.1730. It therefore is reportedly has a buffer overflow vulnerability involving the TListbox and TComboBox VCL components.

To exploit the vulnerability remotely, an attacker would need to know the included filters of the connected client to send large strings.

Successful exploitation would allow an attacker to execute arbitrary code within the context of the affected application.

Solution

Upgrade to FlashFXP 4.2.0 (4.2.0.1730) or later.

See Also

https://seclists.org/fulldisclosure/2012/Mar/7

http://www.nessus.org/u?36d5d30c

Plugin Details

Severity: High

ID: 60111

File Name: flashfxp_4_2_0_1730.nasl

Version: 1.8

Type: local

Agent: windows

Family: Windows

Published: 7/24/2012

Updated: 12/4/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2012-4992

Vulnerability Information

CPE: cpe:/a:flashfxp:flashfxp

Required KB Items: SMB/FlashFXP/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/1/2012

Vulnerability Publication Date: 3/1/2012

Reference Information

CVE: CVE-2012-4992

BID: 52259