Vulnerabilities > CVE-2006-2173 - Remote Buffer Overflow vulnerability in FileZilla FTP Server

047910
CVSS 6.4 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
filezilla
nessus

Summary

Buffer overflow in FileZilla FTP Server 2.2.22 allows remote authenticated attackers to cause a denial of service and possibly execute arbitrary code via a long (1) PORT or (2) PASS followed by the MLSD command, or (2) the remote server interface, as demonstrated by the Infigo FTPStress Fuzzer.

Vulnerable Configurations

Part Description Count
Application
Filezilla
1

Nessus

NASL familyWindows
NASL idFILEZILLA_SERVER_INTERFACE_BUFFER_OVERFLOW.NASL
descriptionAccording to its version, the FileZilla Server Interface installed on the remote host is affected by an unspecified buffer overflow vulnerability, which could be leveraged by an attacker to execute arbitrary code subject to the privileges of the user running the affected application. Note that to successfully exploit this remotely, the application would need to be configured to accept remote connections, which it does not by default.
last seen2020-06-01
modified2020-06-02
plugin id21567
published2006-05-16
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/21567
titleFileZilla FTP Server MLSD Command Overflow