Impact
The vulnerability in SmartFTP Client version 9.0.2615.0 allows an attacker to trigger a crash by entering an overly long string into the Host field. When a buffer of 300 repeated characters is supplied, the application fails, resulting in a loss of availability for the user and potentially denying service to users who rely on the client for file transfers.
Affected Systems
The issue is limited to SmartFTP Client 9.0.2615.0, which is typically installed on Windows desktops used for file transfer tasks. Users who run this specific client version on a local system are susceptible to the denial of service.
Risk and Exploitability
The CVSS score is 6.9, indicating moderate severity. No exploit probability score or KEV listing is available, suggesting that automated exploitation is not yet documented. The attack vector is local, requiring the attacker to run the client or supply the Host field directly. Overall, the risk is moderate because the impact is confined to application availability and only occurs with local access.
OpenCVE Enrichment