VID |
28170 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The FileZilla FTP Client, according to its version number, has a buffer overflow vulnerability which exists in versions prior to 2.2.23. FileZilla is a free Windows-based application for transferring files between PC and an FTP site. FileZilla FTP Client versions prior to 2.2.23 are vulnerable to a buffer overflow vulnerability, caused by improper bounds checking of replies from an FTP server. By causing a victim user to connect to a malicious FTP server, a remote attacker could exploit this vulnerability to execute arbitrary code on the victim's system.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://filezilla.sourceforge.net/ http://sourceforge.net/project/shownotes.php?release_id=416790 http://secunia.com/advisories/20086/ http://www.frsirt.com/english/advisories/2006/1795
* Platforms Affected: FileZilla SourceForge project, FileZilla FTP Client versions prior to 2.2.23 Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of FileZilla Client (2.2.23 or later), available from the SourceForge.net FileZilla Client Project Download Web site at http://sourceforge.net/project/showfiles.php?group_id=21558&package_id=15149 |
Related URL |
CVE-2006-2403 (CVE) |
Related URL |
17972 (SecurityFocus) |
Related URL |
26450 (ISS) |
|