First published: Fri Aug 09 2013(Updated: )
Buffer overflow in NetWin SurgeFTP before 23d2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string within the authentication request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SurgeFTP | <=2.3b1 | |
SurgeFTP | =2.0c | |
SurgeFTP | =2.0d | |
SurgeFTP | =2.0e | |
SurgeFTP | =2.0f | |
SurgeFTP | =2.2k1 | |
SurgeFTP | =2.2k3 | |
SurgeFTP | =2.2m1 | |
SurgeFTP | =2.3a1 | |
SurgeFTP | =2.3a2 | |
SurgeFTP | =2.3a6 | |
SurgeFTP | =2.3a7 | |
SurgeFTP | =2.3a8 | |
SurgeFTP | =2.3a9 | |
SurgeFTP | =2.3a10 | |
SurgeFTP | =2.3a12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4742 has a high severity rating due to its potential to cause a denial of service and execute arbitrary code.
To fix CVE-2013-4742, you should upgrade NetWin SurgeFTP to version 23d2 or later.
CVE-2013-4742 affects all NetWin SurgeFTP versions prior to 23d2, including 2.3b1 and earlier versions.
CVE-2013-4742 facilitates a buffer overflow attack that can lead to denial of service or remote code execution.
Yes, CVE-2013-4742 is considered critical as it allows remote attackers to exploit the flaw without requiring authentication.