Executive Summary

Informations
Name CVE-2008-5753 First vendor Publication 2008-12-30
Vendor Cve Last vendor Modification 2017-09-29

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Stack-based buffer overflow in BulletProof FTP Client 2.63 and 2010 allows user-assisted attackers to execute arbitrary code via a bookmark file entry with a long host name, which appears as a host parameter within the quick-connect bar.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5753

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2009-01-06 Name : BulletProof FTP Client '.bps' File Buffer Overflow Vulnerability
File : nvt/gb_bpftp_client_bof_vuln.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
50968 BulletProof FTP Client Server Name Handling Overflow

Snort® IPS/IDS

Date Description
2015-02-13 BulletProof FTP Client BPS file buffer overflow attempt
RuleID : 33063 - Revision : 3 - Type : FILE-OTHER
2015-02-13 BulletProof FTP Client BPS file buffer overflow attempt
RuleID : 33062 - Revision : 3 - Type : FILE-OTHER

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/33007
CERT-VN http://www.kb.cert.org/vuls/id/565580
EXPLOIT-DB https://www.exploit-db.com/exploits/37056/
https://www.exploit-db.com/exploits/7571
MISC http://packetstormsecurity.com/files/131965/BulletProof-FTP-Client-2010-Buffe...
OSVDB http://osvdb.org/50968
SECUNIA http://secunia.com/advisories/33322
SREASON http://securityreason.com/securityalert/4835

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
Date Informations
2021-05-04 12:08:36
  • Multiple Updates
2021-04-22 01:08:57
  • Multiple Updates
2020-05-23 00:22:48
  • Multiple Updates
2017-09-29 09:23:53
  • Multiple Updates
2016-12-31 09:24:16
  • Multiple Updates
2016-06-28 17:23:44
  • Multiple Updates
2016-03-31 21:24:38
  • Multiple Updates
2015-06-04 09:26:20
  • Multiple Updates
2015-01-02 21:23:49
  • Multiple Updates
2014-12-24 09:22:59
  • Multiple Updates
2013-05-11 00:33:46
  • Multiple Updates