First published: Fri Apr 02 2021(Updated: )
Buffer overflow in Core FTP LE v2.2 allows local attackers to cause a denial or service (crash) via a long string in the Setup->Users->Username editbox.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tsolucio Corebos | =2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2020-21588.
CVE-2020-21588 has a severity rating of medium.
CVE-2020-21588 allows local attackers to cause a denial of service (crash) in Core FTP LE v2.2 by exploiting a buffer overflow vulnerability in the Setup->Users->Username editbox.
To fix CVE-2020-21588 in Core FTP LE v2.2, you should update to the latest version of the software as soon as it becomes available.
Yes, you can find references for CVE-2020-21588 at the following links: [GitHub Issue 1](https://github.com/lonely-explorer/CoreFTP/issues/1) and [GitHub Issue 2](https://github.com/pwnninja/CoreFTP/issues/1).