{"vuid":"VU#714584","idnumber":"714584","name":"BlackJumboDog contains buffer overflow vulnerability","keywords":["BlackJumboDog","buffer overflow","boundary error","FTP commands"],"overview":"BlackJumboDog fails to verify the length of several FTP commands, creating a buffer overflow vulnerability. Exploitation of this vulnerability may result in code execution on the target system with privileges of the FTP service.","clean_desc":"BlackJumboDog is a multi-function server for Microsoft Windows, providing FTP, email, web, and proxy services. Version 3.6.1 contains a buffer overflow vulnerability. BlackJumboDog fails to check the length of FTP commands passed to it. Using specially crafted FTP commands, a remote user can trigger a buffer overflow condition and possibly execute code on the server.","impact":"A remote attacker may be able to exploit this vulnerability to compromise the BlackJumboDog system.","resolution":"This issue has been resolved in version 3.6.2 of BlackJumboDog.","workarounds":"","sysaffected":"","thanks":"Thanks to Secunia, Tan Chew Keong, and SIG^2 for the information contained in their security advisories","author":"This document was written by Will Dormann.","public":["http://secunia.com/advisories/12203/","http://www.security.org.sg/vuln/bjd361.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-08-02T18:39:06Z","publicdate":"2004-08-02T00:00:00Z","datefirstpublished":"2004-08-03T15:52:49Z","dateupdated":"2005-04-14T18:09:17Z","revision":14,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"10","cam_internetinfrastructure":"5","cam_population":"1","cam_impact":"15","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"3.375","cam_scorecurrentwidelyknown":"3.9375","cam_scorecurrentwidelyknownexploited":"5.0625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":3.375,"vulnote":null}