Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

FTP:EXPLOIT:LEAPFTP-CLI-BO

Severity

High

Recommended

Yes

Recommended Action

Drop

Category

FTP

Keywords

LeapWare LeapFTP PASV Reply Client Overflow

Release Date

2015/06/12

Update Number

2504

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

FTP: LeapWare LeapFTP PASV Reply Client Overflow


This signature detects attempts to exploit a known vulnerability in the LeapFTP. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the FTP client.

Extended Description

LeapFTP client has been reported prone to a remote buffer overflow vulnerability. The issue is likely due to insufficient bounds checking and presents itself when the affected FTP client makes a connection to a malicious server that is running PASV mode. It has been reported that it is possible to supply and execute arbitrary code in the context of the user running LeapFTP client.

Affected Products

  • LeapWare LeapFTP 2.7.3 .600
  • LeapWare LeapFTP 2.7.4

References

  • BugTraq: 7860
  • CVE: CVE-2003-0558

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out