CVE-2025-11947
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-19

Last updated on: 2026-04-29

Assigner: VulDB

Description
A weakness has been identified in bftpd up to 6.2. Impacted is the function expand_groups of the file options.c of the component Configuration File Handler. Executing a manipulation can lead to heap-based buffer overflow. It is possible to launch the attack on the local host. Attacks of this nature are highly complex. The exploitability is considered difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-19
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-10-20
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
bftpd bftpd 6.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-122 A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
CWE-119 The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a heap-based buffer overflow in the expand_groups function of the options.c file in bftpd up to version 6.2. It occurs due to a weakness in the Configuration File Handler component. An attacker with local access can manipulate inputs to trigger this overflow, potentially causing unexpected behavior or crashes. Exploiting this vulnerability is considered difficult, but a public exploit exists.


How can this vulnerability impact me? :

The vulnerability can lead to a heap-based buffer overflow, which may allow an attacker with local access to cause a denial of service or potentially execute arbitrary code, depending on the context. However, the exploitability is difficult, and the attack requires local access. The impact includes partial confidentiality, integrity, and availability loss as indicated by the CVSS scores.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart