1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. Attack: Xlink FTP Multiple Buffer Overflow

Attack: Xlink FTP Multiple Buffer Overflow

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempts to exploit a buffer overflow vulnerability in Xlink FTP which could result in remote code execution.

Additional Information

Xlink FTP is prone to a remote buffer-overflow issue because it fails to perform adequate boundary checks on user-supplied data. This issue occurs when:

1. an overly long ftp request is sent to the server
2. an overly long server response is received by the client

Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the user running the application. Failed exploit attempts likely result in denial-of-service conditions.

Affected

  • Xlink FTP
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube