Overview
BulletProof FTP Client 2010 is vulnerable to a stack-based buffer overflow
Description
CWE-121 - Stack-based Buffer Overflow |
Impact
A local attacker may be able to overwrite the stack memory causing the process to crash or create unpredictable behavior. It is possible that this vulnerability may be used to execute arbitrary code in the context of the logged in user. |
Solution
The CERT/CC is currently unaware of a practical solution to this problem. |
Use the Microsoft Enhanced Mitigation Experience Toolkit The Microsoft Enhanced Mitigation Experience Toolkit (EMET) can be used to help prevent exploitation of this vulnerability. CERT/CC has created a video tutorial for setting up EMET 3.0 on Windows 7. Note that platforms that do not support ASLR, such as Windows XP and Windows Server 2003, will not receive the same level of protection that modern Windows platforms will. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 4.3 | AV:L/AC:L/Au:S/C:P/I:P/A:P |
Temporal | 3.9 | E:POC/RL:U/RC:C |
Environmental | 2.9 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Gabor Seljan for reporting this vulnerability.
This document was written by Chris King.
Other Information
CVE IDs: | CVE-2014-2973 |
Date Public: | 2014-07-24 |
Date First Published: | 2014-07-24 |
Date Last Updated: | 2014-07-25 04:35 UTC |
Document Revision: | 16 |