{"vuid":"VU#620862","idnumber":"620862","name":"Golden FTP server contains a buffer overflow","keywords":["Golden FTP Server","buffer overflow","RNTO command","rename request","RNFR command"],"overview":"Golden FTP server contains a buffer overflow that may allow a remote attacker to execute arbitrary code.","clean_desc":"Golden FTP server is a personal FTP server for the Microsoft Windows platform. The RNTO (rename to) command is used in conjunction with the RNFR (rename from) to rename a file on the server. Specifically, RNFR is used to specify the current name of the file, and RNTO is used to specify the new name for the file. If a remote unauthenticated attacker sends a specially crafted rename request (RNFR and RNTO) to a vulnerable Golden FTP server, they may be able to trigger a buffer overflow vulnerability in the routine that handles RNTO commands. Please note that an exploit for this vulnerability is publicly available.","impact":"A remote unauthenticated attacker may be able to execute arbitrary code with the privileges of the Golden FTP server.","resolution":"Upgrade According to the developers of Golden FTP server, this issue has been corrected in Golden FTP server version 2.05b","workarounds":"","sysaffected":"","thanks":"Thanks to barabas mutsonline for reporting this vulnerability.","author":"This document was written by Lucy Crocker.","public":["http://secunia.com/advisories/13966/","http://www.osvdb.org/displayvuln.php?osvdb_id=13139"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-01-24T19:29:47Z","publicdate":"2005-01-22T00:00:00Z","datefirstpublished":"2005-02-25T16:49:46Z","dateupdated":"2005-02-25T16:49:56Z","revision":60,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"10","cam_impact":"20","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"17.25","cam_scorecurrentwidelyknown":"17.25","cam_scorecurrentwidelyknownexploited":"32.25","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":17.25,"vulnote":null}