Odin Secure FTP <= 4.1 is vulnerable to a stack-based buffer overflow when parsing directory listings received in response to an FTP LIST command. A malicious FTP server can send an overly long filename in the directory listing, which overflows a fixed-size stack buffer in the client and overwrites the Structured Exception Handler (SEH). This allows remote attackers to execute arbitrary code on the client system.
History

Fri, 22 Aug 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 20 Aug 2025 15:45:00 +0000

Type Values Removed Values Added
Description Odin Secure FTP <= 4.1 is vulnerable to a stack-based buffer overflow when parsing directory listings received in response to an FTP LIST command. A malicious FTP server can send an overly long filename in the directory listing, which overflows a fixed-size stack buffer in the client and overwrites the Structured Exception Handler (SEH). This allows remote attackers to execute arbitrary code on the client system.
Title Odin Secure FTP <= 4.1 Stack Buffer Overflow via LIST Response
Weaknesses CWE-121
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-08-22T16:12:25.765Z

Reserved: 2025-08-19T17:04:02.876Z

Link: CVE-2010-10014

cve-icon Vulnrichment

Updated: 2025-08-22T16:12:08.786Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-20T16:15:33.227

Modified: 2025-08-22T18:09:17.710

Link: CVE-2010-10014

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.