CVE-2010-20107
BaseFortify
Publication date: 2025-08-21
Last updated on: 2025-08-22
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ftp_synchronizer | ftp_synchronizer | 5.0.90 |
| ftp_synchronizer | ftp_synchronizer_professional | 4.0.73.274 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stack-based buffer overflow in FTP Synchronizer Professional versions up to 4.0.73.274. It occurs when the client connects to an FTP server and issues a LIST command. If the server's response contains an excessively long filename, it triggers a buffer overflow that corrupts the Structured Exception Handler (SEH), which can potentially allow remote code execution.
How can this vulnerability impact me? :
The vulnerability can lead to remote code execution on the affected system. This means an attacker could execute arbitrary code with the privileges of the FTP Synchronizer client, potentially compromising the system's security and allowing unauthorized actions.