CVE-2008-5753
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
30/12/2008
Last modified:
09/04/2025
Description
Stack-based buffer overflow in BulletProof FTP Client 2.63 and 2010 allows user-assisted attackers to execute arbitrary code via a bookmark file entry with a long host name, which appears as a host parameter within the quick-connect bar.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:bpftp:bulletproof_ftp_client:2.63:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://osvdb.org/50968
- http://packetstormsecurity.com/files/131965/BulletProof-FTP-Client-2010-Buffer-Overflow.html
- http://secunia.com/advisories/33322
- http://securityreason.com/securityalert/4835
- http://www.kb.cert.org/vuls/id/565580
- http://www.securityfocus.com/bid/33007
- https://www.exploit-db.com/exploits/37056/
- https://www.exploit-db.com/exploits/7571
- http://osvdb.org/50968
- http://packetstormsecurity.com/files/131965/BulletProof-FTP-Client-2010-Buffer-Overflow.html
- http://secunia.com/advisories/33322
- http://securityreason.com/securityalert/4835
- http://www.kb.cert.org/vuls/id/565580
- http://www.securityfocus.com/bid/33007
- https://www.exploit-db.com/exploits/37056/
- https://www.exploit-db.com/exploits/7571