9.3
CVSSv2

CVE-2008-5754

Published: 30/12/2008 Updated: 29/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 945
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in BulletProof FTP Client allows user-assisted malicious users to execute arbitrary code via a .bps file (aka Session-File) with a long second line, possibly a related issue to CVE-2008-5753.

Vulnerable Product Search on Vulmon Subscribe to Product

bpftp bulletproof ftp client _nil_

Exploits

#!/usr/bin/python #[*] Bug : BulletProof FTP Client 2009 (bps) Buffer Overflow Exploit (SEH) #[*] Credits : Stack #[*] Tested on : Xp sp2 (fr) #[*] Exploited by : His0k4 #[*] Greetings : All friends & muslims HaCkErs (DZ),snakespccom,secdzcom #[*] Chi3arona houa : Serra7 merra7,koulchi mderra7 :D #[*] translate by Cyb3 ...
/* BulletProof FTP Client suffer a buffer overflow (SEH) Tested on BullerProof FTP Client v 263 build 56 (The last one) but may work with older releases as well Registers: EAX 00000000 ECX 65646362 EDX 7C9032BC ntdll7C9032BC EBX 00000000 ESP 0012F1E0 EBP 0012F200 ESI 00000000 EDI 00000000 EIP 65646362 C 0 ES 0023 32bit 0(FFFFFFFF) P 1 CS 0 ...
#!/usr/bin/perl ######################################## #[*] Bug : BulletProof FTP Client bps Local Stack Overflow (PoC) #[*] Founded by : Mountassif Moad #[*] Greetz : All Freind Str0ke #[*] HOw to use => go to file after Load BP session & Enter and boom :d overflowing :d ######################################## use warnings; use strict; ...