Odin Secure FTP <= 4.1 is vulnerable to a stack-based buffer overflow when parsing directory listings received in response to an FTP LIST command. A malicious FTP server can send an overly long filename in the directory listing, which overflows a fixed-size stack buffer in the client and overwrites the Structured Exception Handler (SEH). This allows remote attackers to execute arbitrary code on the client system.
Metrics
Affected Vendors & Products
References
History
Wed, 20 Aug 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Odin Secure FTP <= 4.1 is vulnerable to a stack-based buffer overflow when parsing directory listings received in response to an FTP LIST command. A malicious FTP server can send an overly long filename in the directory listing, which overflows a fixed-size stack buffer in the client and overwrites the Structured Exception Handler (SEH). This allows remote attackers to execute arbitrary code on the client system. | |
Title | Odin Secure FTP <= 4.1 Stack Buffer Overflow via LIST Response | |
Weaknesses | CWE-121 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-20T15:38:23.796Z
Updated: 2025-08-20T15:38:23.796Z
Reserved: 2025-08-19T17:04:02.876Z
Link: CVE-2010-10014

No data.

Status : Received
Published: 2025-08-20T16:15:33.227
Modified: 2025-08-20T16:15:33.227
Link: CVE-2010-10014

No data.