zFTP Client 20061220+dfsg3-4.1 contains a buffer overflow vulnerability in the NAME parameter handling of FTP connections that allows local attackers to crash the application or execute arbitrary code. Attackers can supply an oversized NAME value exceeding the 80-byte buffer allocated in strcpy_chk to overwrite the instruction pointer and execute shellcode with user privileges.
Metrics
Affected Vendors & Products
References
History
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zftp
Zftp zftp Client |
|
| Vendors & Products |
Zftp
Zftp zftp Client |
Sat, 28 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | zFTP Client 20061220+dfsg3-4.1 contains a buffer overflow vulnerability in the NAME parameter handling of FTP connections that allows local attackers to crash the application or execute arbitrary code. Attackers can supply an oversized NAME value exceeding the 80-byte buffer allocated in strcpy_chk to overwrite the instruction pointer and execute shellcode with user privileges. | |
| Title | zFTP Client 20061220+dfsg3-4.1 Local Buffer Overflow | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-03-28T11:58:06.907Z
Updated: 2026-03-28T11:58:06.907Z
Reserved: 2026-03-28T11:39:30.497Z
Link: CVE-2016-20046
No data.
Status : Awaiting Analysis
Published: 2026-03-28T12:16:00.827
Modified: 2026-03-30T13:26:07.647
Link: CVE-2016-20046
No data.