Korean
<< Back
VID 28170
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The FileZilla FTP Client, according to its version number, has a buffer overflow vulnerability which exists in versions prior to 2.2.23. FileZilla is a free Windows-based application for transferring files between PC and an FTP site. FileZilla FTP Client versions prior to 2.2.23 are vulnerable to a buffer overflow vulnerability, caused by improper bounds checking of replies from an FTP server. By causing a victim user to connect to a malicious FTP server, a remote attacker could exploit this vulnerability to execute arbitrary code on the victim's system.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://filezilla.sourceforge.net/
http://sourceforge.net/project/shownotes.php?release_id=416790
http://secunia.com/advisories/20086/
http://www.frsirt.com/english/advisories/2006/1795

* Platforms Affected:
FileZilla SourceForge project, FileZilla FTP Client versions prior to 2.2.23
Microsoft Windows Any version
Recommendation Upgrade to the latest version of FileZilla Client (2.2.23 or later), available from the SourceForge.net FileZilla Client Project Download Web site at
http://sourceforge.net/project/showfiles.php?group_id=21558&package_id=15149
Related URL CVE-2006-2403 (CVE)
Related URL 17972 (SecurityFocus)
Related URL 26450 (ISS)