source: http://www.securityfocus.com/bid/21714/info FTPRush is prone to a local buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input data to an insufficiently sized buffer. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in denial-of-service conditions. This issue affects version 188.8.131.520; other versions may also be vulnerable. Supplying the following to the client GUI is sufficient to demonstrate this issue: Host: 4131 x "A"
Related ExploitsTrying to match CVEs (1): CVE-2006-6752
Trying to match OSVDBs (1): 37393
Other Possible E-DB Search Terms: FTPRush 1.0.610, FTPRush