1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. Attack: Cursorarts Filewrangler "LIST" Command Buffer Overflow

Attack: Cursorarts Filewrangler "LIST" Command Buffer Overflow

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.


This signature detects attempts to exploit a buffer overflow vulnerability in CursorArts Filewrangle Command which may result in arbitrary code execution.

Additional Information

CursorArts Filewrangler is an FTP file transfer program for Microsoft Windows platforms.

The application is prone to a stack-based buffer-overflow vulnerability because it fails to properly validate the filenames sent as a response to the 'LIST' command in FTP connections before copying them into an insufficiently sized buffer. Attackers can leverage this issue to corrupt and overwrite memory. This may allow them to change the flow of execution and gain control of the affected application.

An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.


  • CursorArts Filewrangler 5.30 is vulnerable; other versions may also be affected.

Additional References

  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube