CVE-2011-5164

Stack-based buffer overflow in VanDyke Software AbsoluteFTP 1.9.6 through 2.2.10 allows remote FTP servers to execute arbitrary code via a crafted file name in a LIST command response.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vandyke:absoluteftp:1.9.6:*:*:*:*:*:*:*
cpe:2.3:a:vandyke:absoluteftp:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vandyke:absoluteftp:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:vandyke:absoluteftp:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:vandyke:absoluteftp:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:vandyke:absoluteftp:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:vandyke:absoluteftp:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:vandyke:absoluteftp:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:vandyke:absoluteftp:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:vandyke:absoluteftp:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:vandyke:absoluteftp:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:vandyke:absoluteftp:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:vandyke:absoluteftp:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:vandyke:absoluteftp:2.2.10:*:*:*:*:*:*:*

History

21 Nov 2024, 01:33

Type Values Removed Values Added
References () http://secunia.com/advisories/46781 - Vendor Advisory () http://secunia.com/advisories/46781 - Vendor Advisory
References () http://www.exploit-db.com/exploits/18102 - Exploit () http://www.exploit-db.com/exploits/18102 - Exploit
References () http://www.osvdb.org/77105 - () http://www.osvdb.org/77105 -
References () http://www.saintcorporation.com/cgi-bin/exploit_info/vandyke_absoluteftp_list_client_overflow - () http://www.saintcorporation.com/cgi-bin/exploit_info/vandyke_absoluteftp_list_client_overflow -
References () http://www.securityfocus.com/bid/50614 - () http://www.securityfocus.com/bid/50614 -

Information

Published : 2012-09-15 17:55

Updated : 2024-11-21 01:33


NVD link : CVE-2011-5164

Mitre link : CVE-2011-5164

CVE.ORG link : CVE-2011-5164


JSON object : View

Products Affected

vandyke

  • absoluteftp
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer