FTPShell Client Buffer Overflow

Strike ID:
E18-0yes1
CVSS:
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
False Positive:
f
Variants:
2
Year:
2018

Description

This strike exploits a buffer overflow vulnerability in the FTPShell client. The vulnerability is due to improper response length check, which allows a malicious server to overflow the client with a server's command response. This can result in either a denial of service condition or lead to remote code execution in the context of the current user, allowing for complete compromise of the remote system. NOTE: Strike will launch either calc.exe or notepad.exe when run in OneArm mode. Client must connect to the FTP in Anonymous mode.

CVE