This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects attempts to exploit a buffer overflow vulnerability in Xlink FTP which could result in remote code execution.
Xlink FTP is prone to a remote buffer-overflow issue because it fails to perform adequate boundary checks on user-supplied data. This issue occurs when:
1. an overly long ftp request is sent to the server
2. an overly long server response is received by the client
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the user running the application. Failed exploit attempts likely result in denial-of-service conditions.