First published: Thu Jan 18 2007(Updated: )
Multiple buffer overflows in FileZilla before 2.2.30a allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors related to (1) Options.cpp when storing settings in the registry, and (2) the transfer queue (QueueCtrl.cpp). NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla VPN | =2.2.15 | |
Mozilla VPN | =2.2.24 | |
Mozilla VPN | =2.2.25 | |
Mozilla VPN | =2.2.22 | |
Mozilla VPN | =0.9.20 | |
Mozilla VPN | =2.2.27 | |
Mozilla VPN | =2.2.29 | |
Mozilla VPN | =2.2.26a | |
Mozilla VPN | =2.2.23 | |
Mozilla VPN | =2.2.26 | |
Mozilla VPN | =0.9.21 | |
Mozilla VPN | =0.9.22 | |
Mozilla VPN | <=2.2.30 | |
Mozilla VPN | =2.2.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0315 is classified as a high severity vulnerability due to its potential for remote code execution and denial of service.
To fix CVE-2007-0315, upgrade FileZilla to version 2.2.30 or later to patch the buffer overflow vulnerabilities.
CVE-2007-0315 affects FileZilla versions prior to 2.2.30, including versions 0.9.20 through 2.2.29.
CVE-2007-0315 can be exploited by remote attackers to execute arbitrary code or crash the application due to buffer overflow vulnerabilities.
CVE-2007-0315 is not a persistent vulnerability but can be exploited during runtime when the affected versions are in use.