CVE-2008-5753
CVSS V2 High 9.3
CVSS V3 None
Description
Stack-based buffer overflow in BulletProof FTP Client 2.63 and 2010 allows user-assisted attackers to execute arbitrary code via a bookmark file entry with a long host name, which appears as a host parameter within the quick-connect bar.
Overview
- CVE ID
- CVE-2008-5753
- Assigner
- cve@mitre.org
- Vulnerability Status
- Modified
- Published Version
- 2008-12-30T17:30:00
- Last Modified Date
- 2017-09-29T01:32:47
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:bpftp:bulletproof_ftp_client:2.63:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:C/I:C/A:C
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- COMPLETE
- Integrity Impact
- COMPLETE
- Availability Impact
- COMPLETE
- Base Score
- 9.3
- Severity
- HIGH
- Exploitability Score
- 8.6
- Impact Score
- 10
References
Reference URL | Reference Tags |
---|---|
http://www.securityfocus.com/bid/33007 | Exploit |
http://osvdb.org/50968 | |
http://secunia.com/advisories/33322 | |
http://securityreason.com/securityalert/4835 | |
http://www.kb.cert.org/vuls/id/565580 | Third Party Advisory US Government Resource |
http://packetstormsecurity.com/files/131965/BulletProof-FTP-Client-2010-Buffer-Overflow.html | Exploit |
https://www.exploit-db.com/exploits/37056/ | |
https://www.exploit-db.com/exploits/7571 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2008-5753 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5753 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 08:22:06 | Added to TrackCVE |