First published: Sun Dec 25 2011(Updated: )
Heap-based buffer overflow in the Reflection FTP Client (rftpcom.dll 7.2.0.106 and possibly other versions), as used in Attachmate Reflection 2008, Reflection 2011 R1 before 15.3.2.569 and R1 SP1 before, Reflection 2011 R2 before 15.4.1.327, Reflection Windows Client 7.2 SP1 before hotfix 7.2.1186, and Reflection 14.1 SP1 before 14.1.1.206, allows remote FTP servers to execute arbitrary code via a long directory name in a response to a LIST command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Attachmate Reflection for IBM | ||
Attachmate Reflection | ||
Attachmate Reflection | ||
Attachmate Reflection | =14.1-sp1 | |
Attachmate Reflection | =7.2-sp1 | |
Attachmate Reflection | =sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-5012 has a high severity rating due to the potential for remote code execution via a heap-based buffer overflow.
To fix CVE-2011-5012, update the Attachmate Reflection software to the latest version that includes the necessary patches.
CVE-2011-5012 affects various versions of the Attachmate Reflection software including 7.2 SP1 and multiple releases of Reflection 2008 and 2011.
CVE-2011-5012 is classified as a heap-based buffer overflow vulnerability.
Yes, CVE-2011-5012 can be exploited remotely, allowing attackers to execute arbitrary code on the affected system.