First published: Mon Nov 23 2020(Updated: )
Buffer overflow in WinSCP 5.17.8 allows a malicious FTP server to cause a denial of service or possibly have other unspecified impact via a long file name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Winscp Winscp | =5.17.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28864 is a buffer overflow vulnerability in WinSCP version 5.17.8 that allows a malicious FTP server to cause a denial of service or possibly have other unspecified impact via a long file name.
CVE-2020-28864 has a severity rating of 9.8 (critical).
WinSCP version 5.17.8 is affected by CVE-2020-28864.
A malicious FTP server can exploit CVE-2020-28864 by sending a long file name, triggering a buffer overflow and causing a denial of service or other unspecified impact.
At the moment, there are no known fixes or patches available for CVE-2020-28864. It is recommended to update to a newer version of WinSCP when one becomes available.