Xftp FTP Client version up to and including 3.0 (build 0238) contain a stack-based buffer overflow vulnerability triggered by a maliciously crafted PWD response from an FTP server. When the client connects to a server and receives an overly long directory string in response to the PWD command, the client fails to properly validate the length of the input before copying it into a fixed-size buffer. This results in memory corruption and allows remote attackers to execute arbitrary code on the client system.
CVSS
No CVSS.
References
Configurations
No configuration.
History
22 Aug 2025, 18:08
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
21 Aug 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-21 21:15
Updated : 2025-08-22 18:08
NVD link : CVE-2010-20122
Mitre link : CVE-2010-20122
CVE.ORG link : CVE-2010-20122
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow