Seagull FTP Client <= v3.3 Build 409 contains a stack-based buffer overflow vulnerability in its FTP directory listing parser. When the client connects to an FTP server and receives a crafted response to a LIST command containing an excessively long filename, the application fails to properly validate input length, resulting in a buffer overflow that overwrites the Structured Exception Handler (SEH). This may allow remote attackers to execute arbitrary code on the client system. This product line was discontinued and users were advised to use BlueZone Secure FTP instead, at the time of disclosure.
CVSS
No CVSS.
References
Configurations
No configuration.
History
22 Aug 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/seagull_list_reply.rb - | |
References | () https://www.exploit-db.com/exploits/16705 - | |
Summary |
|
21 Aug 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-21 21:15
Updated : 2025-08-22 18:08
NVD link : CVE-2010-20007
Mitre link : CVE-2010-20007
CVE.ORG link : CVE-2010-20007
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow