Odin Secure FTP <= 4.1 is vulnerable to a stack-based buffer overflow when parsing directory listings received in response to an FTP LIST command. A malicious FTP server can send an overly long filename in the directory listing, which overflows a fixed-size stack buffer in the client and overwrites the Structured Exception Handler (SEH). This allows remote attackers to execute arbitrary code on the client system.
History

Wed, 20 Aug 2025 15:45:00 +0000

Type Values Removed Values Added
Description Odin Secure FTP <= 4.1 is vulnerable to a stack-based buffer overflow when parsing directory listings received in response to an FTP LIST command. A malicious FTP server can send an overly long filename in the directory listing, which overflows a fixed-size stack buffer in the client and overwrites the Structured Exception Handler (SEH). This allows remote attackers to execute arbitrary code on the client system.
Title Odin Secure FTP <= 4.1 Stack Buffer Overflow via LIST Response
Weaknesses CWE-121
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-08-20T15:38:23.796Z

Updated: 2025-08-20T15:38:23.796Z

Reserved: 2025-08-19T17:04:02.876Z

Link: CVE-2010-10014

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-08-20T16:15:33.227

Modified: 2025-08-20T16:15:33.227

Link: CVE-2010-10014

cve-icon Redhat

No data.