In uftpd before 2.11, there is a buffer overflow vulnerability in handle_PORT in ftpcmd.c that is caused by a buffer that is 16 bytes large being filled via sprintf() with user input based on the format specifier string %d.%d.%d.%d. The 16 byte size is correct for valid IPv4 addresses (len('255.255.255.255') == 16), but the format specifier %d allows more than 3 digits. This has been fixed in version 2.11
Advisories
Source ID Title
EUVD EUVD EUVD-2020-26447 In uftpd before 2.11, there is a buffer overflow vulnerability in handle_PORT in ftpcmd.c that is caused by a buffer that is 16 bytes large being filled via sprintf() with user input based on the format specifier string %d.%d.%d.%d. The 16 byte size is correct for valid IPv4 addresses (len('255.255.255.255') == 16), but the format specifier %d allows more than 3 digits. This has been fixed in version 2.11
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T08:22:08.699Z

Reserved: 2020-01-02T00:00:00

Link: CVE-2020-5204

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-01-06T20:15:12.523

Modified: 2024-11-21T05:33:40.420

Link: CVE-2020-5204

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses