FTP: LeapWare LeapFTP PASV Reply Client Overflow

This signature detects attempts to exploit a known vulnerability in the LeapFTP. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the FTP client.

Extended Description

LeapFTP client has been reported prone to a remote buffer overflow vulnerability. The issue is likely due to insufficient bounds checking and presents itself when the affected FTP client makes a connection to a malicious server that is running PASV mode. It has been reported that it is possible to supply and execute arbitrary code in the context of the user running LeapFTP client.

Affected Products

Leapware leapftp

References

BugTraq: 7860

CVE: CVE-2003-0558

Short Name
FTP:EXPLOIT:LEAPFTP-CLI-BO
Severity
Major
Recommended
True
Recommended Action
Drop
Category
FTP
Keywords
CVE-2003-0558 Client LeapFTP LeapWare Overflow PASV Reply bid:7860
Release Date
06/12/2015
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Leapware

CVSS Score

7.5

Found a potential security threat?