FileZilla Client < 3.7.3 Multiple Vulnerabilities

Medium Nessus Plugin ID 69494


The remote Windows host has an application that is affected by multiple vulnerabilities.


The version of FileZilla Client on the remote host is a version prior to 3.7.3. As such, it is affected by multiple vulnerabilities :

- A buffer underrun vulnerability exists that occurs when verifying a DSA signature when using SFTP.

- A remote buffer overflow vulnerability exists that is triggered when processing a specially crafted DSA signature when using SFTP. (CVE-2013-4207)

- Multiple information disclosure vulnerabilities exist due to improper cleaning of private keys used in SFTP sessions. An attacker could exploit these issues by tricking a user into connecting to a specially crafted SFTP server. This can lead to code execution, denial of service, and access to sensitive information like SFTP login passwords, obsolete session keys, public-key pass phrases, and the private halves of public keys.


Upgrade to FileZilla Client 3.7.3 or later.

See Also

Plugin Details

Severity: Medium

ID: 69494

File Name: filezilla_373.nasl

Version: $Revision: 1.4 $

Type: local

Agent: windows

Family: Windows

Published: 2013/08/13

Modified: 2013/11/05

Dependencies: 69475

Risk Information

Risk Factor: Medium


Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:filezilla:filezilla

Required KB Items: SMB/Registry/Enumerated, SMB/filezilla/Installed

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/08/07

Vulnerability Publication Date: 2013/08/05

Reference Information

CVE: CVE-2013-4206, CVE-2013-4207, CVE-2013-4208

BID: 61644, 61645, 61649

OSVDB: 96210, 96080, 96081