9.3
CVSSv2

CVE-2010-1465

Published: 16/04/2010 Updated: 17/08/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 940
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in Trellian FTP client 3.01, including 3.1.3.1789, allows remote malicious users to execute arbitrary code via a long PASV response.

Vulnerable Product Search on Vulmon Subscribe to Product

trellian ftp 3.01

trellian ftp 3.1.3.1789

Exploits

## # $Id: trellian_client_pasvrb 9525 2010-06-15 07:18:08Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## class Metasploit3 &lt ...
# Exploit Title: Trellian FTP Client PASV BOF exploit # Date: 2010-04-11 # Author: zombiefx # Software Link: wwwtrelliancom/bin/lu/dl/TrellianFTPexe # Version: Trellian FTP Client v 301 # Tested on: Windows XP SP3 # Usage: /ftpserverpl # Acts as a fake ftp server that passes the vulnerable PASV command when a clients connects # Code: ...