1. Symantec-Broadcom-Horizontal/
  2. Security Response/
  3. Attack Signatures/
  4. Attack: AbsoluteFTP LIST Command BO

Attack: AbsoluteFTP LIST Command BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.


This signature detects attempts to exploit a buffer overflow vulnerability in AbsoluteFTP which may result in arbitrary code execution.

Additional Information

AbsoluteFTP is an FTP file transfer program for Microsoft Windows.

The application is prone to a stack-based buffer-overflow vulnerability because it fails to properly validate the filenames sent as a response to the 'LIST' command in FTP connections before copying them into an insufficiently sized buffer. Attackers can leverage this issue to corrupt and overwrite memory. This may allow them to change the flow of execution and gain control of the affected application.

An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.


  • AbsoluteFTP 1.9.6 through 2.2.10 are vulnerable; other versions may also be affected.
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube