Vulnerabilities > CVE-2003-1260 - Buffer Overflow vulnerability in Globalscape Cuteftp 5.0
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Buffer overflow in CuteFTP 5.0 allows remote attackers to execute arbitrary code via a long response to a LIST command.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | GlobalScape CuteFTP 5.0 LIST Response Buffer Overflow Vulnerability. CVE-2003-1260 . Remote exploit for windows platform |
id | EDB-ID:22184 |
last seen | 2016-02-02 |
modified | 2003-03-26 |
published | 2003-03-26 |
reporter | snooq |
source | https://www.exploit-db.com/download/22184/ |
title | GlobalScape CuteFTP 5.0 LIST Response Buffer Overflow Vulnerability |
Nessus
NASL family | Windows |
NASL id | CUTEFTP_FLAWS.NASL |
description | CuteFTP, an FTP client, is installed on the remote Windows host. The version of CuteFTP on the remote host reportedly is affected by a buffer overflow that may be exploited by an attacker to execute arbitrary commands, subject to the privileges of the current user. To exploit this issue, an attacker would need to set up a rogue FTP server and lure a user of this host to browse it using CuteFTP. In addition, the client is also affected by a flaw in which a local user can crash the client by copying a long URL into the clipboard. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11756 |
published | 2003-06-18 |
reporter | This script is Copyright (C) 2003-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/11756 |
title | CuteFTP < 5.0.2.0 Multiple Vulnerabilities |
References
- http://archives.neohapsis.com/archives/bugtraq/2003-01/0123.html
- http://archives.neohapsis.com/archives/bugtraq/2003-02/0087.html
- http://seclists.org/lists/fulldisclosure/2003/Jan/0126.html
- http://secunia.com/advisories/7898
- http://www.iss.net/security_center/static/11093.php
- http://www.osvdb.org/2181
- http://www.securityfocus.com/archive/1/325659
- http://www.securityfocus.com/bid/6642