Description
Stack-based buffer overflow in BulletProof FTP Client 2.63 and 2010 allows user-assisted attackers to execute arbitrary code via a bookmark file entry with a long host name, which appears as a host parameter within the quick-connect bar.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by His0k4 · pythondoswindows
https://www.exploit-db.com/exploits/7571
exploitdb
WORKING POC
by Gabor Seljan · pythonlocalwindows
https://www.exploit-db.com/exploits/37056
References (8)
Core 8
Core References
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/7571
Exploit x_refsource_misc
http://packetstormsecurity.com/files/131965/BulletProof-FTP-Client-2010-Buffer-Overflow.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/50968
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/33322
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/33007
Third Party Advisory, US Government Resource third-party-advisory
x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/565580
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/37056/
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/4835
Scores
EPSS
0.2778
EPSS Percentile
96.5%
Details
CWE
CWE-119
Status
published
Products (1)
bpftp/bulletproof_ftp_client
2.63
Published
Dec 30, 2008
Tracked Since
Feb 18, 2026