ID |
CVE-2020-5204
|
Sažetak |
In uftpd before 2.11, there is a buffer overflow vulnerability in handle_PORT in ftpcmd.c that is caused by a buffer that is 16 bytes large being filled via sprintf() with user input based on the format specifier string %d.%d.%d.%d. The 16 byte size is correct for valid IPv4 addresses (len('255.255.255.255') == 16), but the format specifier %d allows more than 3 digits. This has been fixed in version 2.11 |
Reference |
|
CVSS |
Base: | 6.5 |
Impact: | 6.4 |
Exploitability: | 8.0 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
LOW |
SINGLE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
PARTIAL |
PARTIAL |
PARTIAL |
|
CVSS vektor |
AV:N/AC:L/Au:S/C:P/I:P/A:P |
Zadnje važnije ažuriranje |
18-01-2020 - 19:15 |
Objavljeno |
06-01-2020 - 20:15 |