Multiple buffer overflows in FileZilla before 2.2.30a allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors related to (1) Options.cpp when storing settings in the registry, and (2) the transfer queue (QueueCtrl.cpp). NOTE: some of these details are obtained from third party information.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/22057 | patch vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/31500 | vdb entry |
http://sourceforge.net/project/shownotes.php?release_id=475423&group_id=21558 | patch |
http://www.vupen.com/english/advisories/2007/0183 | vdb entry vendor advisory |