Vulnerability Details CVE-2020-5204
In uftpd before 2.11, there is a buffer overflow vulnerability in handle_PORT in ftpcmd.c that is caused by a buffer that is 16 bytes large being filled via sprintf() with user input based on the format specifier string %d.%d.%d.%d. The 16 byte size is correct for valid IPv4 addresses (len('255.255.255.255') == 16), but the format specifier %d allows more than 3 digits. This has been fixed in version 2.11
Exploit prediction scoring system (EPSS) score
EPSS Score 0.007
EPSS Ranking 70.8%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 6.5
Products affected by CVE-2020-5204
-
cpe:2.3:a:troglobit:uftpd:0.1
-
cpe:2.3:a:troglobit:uftpd:1.0
-
cpe:2.3:a:troglobit:uftpd:1.1
-
cpe:2.3:a:troglobit:uftpd:1.2
-
cpe:2.3:a:troglobit:uftpd:1.3
-
cpe:2.3:a:troglobit:uftpd:1.4
-
cpe:2.3:a:troglobit:uftpd:1.5
-
cpe:2.3:a:troglobit:uftpd:1.6
-
cpe:2.3:a:troglobit:uftpd:1.7
-
cpe:2.3:a:troglobit:uftpd:1.8
-
cpe:2.3:a:troglobit:uftpd:1.9
-
cpe:2.3:a:troglobit:uftpd:1.9.1
-
cpe:2.3:a:troglobit:uftpd:2.0
-
cpe:2.3:a:troglobit:uftpd:2.0.1
-
cpe:2.3:a:troglobit:uftpd:2.0.2
-
cpe:2.3:a:troglobit:uftpd:2.1
-
cpe:2.3:a:troglobit:uftpd:2.10
-
cpe:2.3:a:troglobit:uftpd:2.2
-
cpe:2.3:a:troglobit:uftpd:2.3
-
cpe:2.3:a:troglobit:uftpd:2.4
-
cpe:2.3:a:troglobit:uftpd:2.5
-
cpe:2.3:a:troglobit:uftpd:2.6
-
cpe:2.3:a:troglobit:uftpd:2.7
-
cpe:2.3:a:troglobit:uftpd:2.8
-
cpe:2.3:a:troglobit:uftpd:2.9