ID

VAR-201004-0508


TITLE

Rumba FTP Client File Name Remote Stack Buffer Overflow Vulnerability

Trust: 0.9

sources: CNVD: CNVD-2010-0715 // BID: 39683

DESCRIPTION

Rumba FTP is a graphical FTP client that supports file encryption transfer. The Rumba FTP client handles boundary errors in the long file names in the returned directory list, constructing a malicious FTP server, convincing the user to access, and triggering a stack-based buffer overflow. Successful exploitation of a vulnerability can execute arbitrary instructions with application privileges. Rumba FTP Client is prone to a remote stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on server-supplied data. Failed exploit attempts will result in a denial-of-service condition. ---------------------------------------------------------------------- Proof-of-Concept (PoC) and Extended Analysis available for customers. The vulnerability is caused due to a boundary error when processing overly long file names returned in directory listings. The vulnerability is reported in version 4.2. Other versions may also be affected. SOLUTION: Do not connect to untrusted FTP servers. PROVIDED AND/OR DISCOVERED BY: zombiefx ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 0.9

sources: CNVD: CNVD-2010-0715 // BID: 39683 // PACKETSTORM: 88898

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2010-0715

AFFECTED PRODUCTS

vendor:netmanagemodel:rumba ftpscope:eqversion:4.2

Trust: 0.9

sources: CNVD: CNVD-2010-0715 // BID: 39683

THREAT TYPE

network

Trust: 0.3

sources: BID: 39683

TYPE

Boundary Condition Error

Trust: 0.3

sources: BID: 39683

EXTERNAL IDS

db:BIDid:39683

Trust: 0.9

db:SECUNIAid:39589

Trust: 0.7

db:CNVDid:CNVD-2010-0715

Trust: 0.6

db:PACKETSTORMid:88898

Trust: 0.1

sources: CNVD: CNVD-2010-0715 // BID: 39683 // PACKETSTORM: 88898

REFERENCES

url:http://secunia.com/advisories/39589/

Trust: 0.7

url:http://www.netmanage.com/products/rumba/rumba_features.asp

Trust: 0.3

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2010-0715 // BID: 39683 // PACKETSTORM: 88898

CREDITS

zombiefx

Trust: 0.3

sources: BID: 39683

SOURCES

db:CNVDid:CNVD-2010-0715
db:BIDid:39683
db:PACKETSTORMid:88898

LAST UPDATE DATE

2022-05-17T02:01:26.196000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2010-0715date:2010-04-27T00:00:00
db:BIDid:39683date:2010-04-26T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2010-0715date:2010-04-27T00:00:00
db:BIDid:39683date:2010-04-26T00:00:00
db:PACKETSTORMid:88898date:2010-04-26T06:38:07