First published: Mon Sep 11 2023(Updated: )
Buffer Overflow vulnerability in RaidenFTPD 2.4.4005 allows a local attacker to execute arbitrary code via the Server name field of the Step by step setup wizard.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RaidenFTPD | =2.4.4050 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39063 is a Buffer Overflow vulnerability in RaidenFTPD 2.4.4005 that allows a local attacker to execute arbitrary code.
A local attacker can exploit CVE-2023-39063 by manipulating the Server name field of the Step by step setup wizard.
CVE-2023-39063 has a severity rating of 7.8, which is considered high.
RaidenFTPD version 2.4.4050 is affected by CVE-2023-39063.
At the moment, there is no specific fix available for CVE-2023-39063. It is recommended to update to a patched version of RaidenFTPD when it becomes available.