CVE-2008-6186

Raidenftpd - Memory Corruption

Title source: rule
STIX 2.1

Description

Stack-based buffer overflow in RaidenFTPD 2.4 build 3620 allows remote authenticated users to cause a denial of service (crash) or execute arbitrary code via long (1) CWD and (2) MLST commands.

Exploits (1)

exploitdb WORKING POC VERIFIED
by dmnt · pythondoswindows
https://www.exploit-db.com/exploits/6742

References (4)

Core 4
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/32216
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2008/2804
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/6742
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/31741

Scores

EPSS 0.3060
EPSS Percentile 96.7%

Details

CWE
CWE-119
Status published
Products (1)
raidenftpd/raidenftpd 2.4
Published Feb 19, 2009
Tracked Since Feb 18, 2026