Intrusion Prevention

Trellian.FTP.Client.PASV.Buffer.Overflow

Description

This indicates an attack attempt against a Buffer Overflow vulnerability in Trellian FTP clients.
The vulnerability is due to an improper boundary check condition in the application when handling a malicious PASV response packet. An attacker can exploit this by tricking an unsuspecting user into visiting a malicious server and execute arbitrary code within the context of the targeted user.

Affected Products

Trellian FTP client 3.1

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Refer to the vendor's Web site for suggested workaround.
http://www.trellian.com/ftp/

CVE References

CVE-2010-1465