Intrusion Prevention

BulletProof.FTP.Client.Bps.Buffer.Overflow

Description

This indicates an attack attempt against a buffer-overflow vulnerability in BulletProof FTP Client.
The vulnerability is caused by an error when the vulnerable software handles a malicious .bps file. It allows a remote attacker to execute arbitrary code via sending a crafted .bps file.

Affected Products

BulletProof FTP Client 2.x

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Do not open untrusted .bps file.

CVE References

CVE-2008-5754