Impact
zFTP Client 20061220+dfsg3-4.1 contains a local buffer overflow in the handling of the NAME parameter for FTP connections. An attacker can supply an oversized NAME value that exceeds the 80‑byte buffer used in strcpy_chk, overwriting the instruction pointer and allowing the execution of arbitrary shellcode with the privileges of the user running the client. In addition to code execution, the overflow can cause the application to crash, resulting in a denial‑of‑service condition.
Affected Systems
The vulnerability affects the zFTP Client product from zFTP, specifically version 20061220+dfsg3-4.1. No other vendors or product versions are listed as affected.
Risk and Exploitability
The CVSS score of 8.6 indicates high severity. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog, suggesting limited known exploitation. The attack vector is local; an attacker must be able to run the client or otherwise supply an oversized NAME value on the local system. Because arbitrary code can be executed with the client’s user privileges, a compromised local account could gain elevated control within the scope of the application.
OpenCVE Enrichment