Vulnerability Note VU#565580

BulletProof FTP Client 2010 is vulnerable to a stack-based buffer overflow

Original Release date: 24 Jul 2014 | Last revised: 25 Jul 2014


BulletProof FTP Client 2010 is vulnerable to a stack-based buffer overflow


CWE-121 - Stack-based Buffer Overflow
BulletProof FTP Client 2010 does not check the length of the host parameter set in the quick connect bar. A long host value causes a stack-based buffer overflow, possibly allowing for arbitrary code execution.


A local attacker may be able to overwrite the stack memory causing the process to crash or create unpredictable behavior. It is possible that this vulnerability may be used to execute arbitrary code in the context of the logged in user.


The CERT/CC is currently unaware of a practical solution to this problem.

Use the Microsoft Enhanced Mitigation Experience Toolkit

The Microsoft Enhanced Mitigation Experience Toolkit (EMET) can be used to help prevent exploitation of this vulnerability. CERT/CC has created a video tutorial for setting up EMET 3.0 on Windows 7. Note that platforms that do not support ASLR, such as Windows XP and Windows Server 2003, will not receive the same level of protection that modern Windows platforms will.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
BulletProof SoftwareAffected-24 Jul 2014
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 4.3 AV:L/AC:L/Au:S/C:P/I:P/A:P
Temporal 3.9 E:POC/RL:U/RC:C
Environmental 2.9 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND



Thanks to Gabor Seljan for reporting this vulnerability.

This document was written by Chris King.

Other Information

  • CVE IDs: CVE-2014-2973
  • Date Public: 24 Jul 2014
  • Date First Published: 24 Jul 2014
  • Date Last Updated: 25 Jul 2014
  • Document Revision: 15


If you have feedback, comments, or additional information about this vulnerability, please send us email.