CVE-2020-37139
Buffer Overflow in Odin Secure FTP 7.6.3 Causes Local DoS
Publication date: 2026-02-05
Last updated on: 2026-02-05
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| odin | secure_ftp_expert | 7.6.3 |
| odin | secure_ftp_expert | to 7.6.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-770 | The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2020-37139 is a local denial of service (DoS) vulnerability in Odin Secure FTP Expert version 7.6.3 and earlier. It occurs due to improper handling of site information fields, where an attacker can cause a buffer overflow by inputting 108 bytes of repeated characters into connection fields. This buffer overflow causes the application to crash.
The vulnerability requires local access and user interaction to exploit, and it does not require any special privileges.
How can this vulnerability impact me? :
This vulnerability can impact you by causing the Odin Secure FTP Expert application to crash, resulting in a denial of service condition. An attacker with local access can exploit this by inputting specially crafted data into the site information fields, disrupting normal use of the software.
The impact is limited to availability, as the application becomes unusable until restarted or fixed.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': "This vulnerability can be detected by attempting to reproduce the crash condition in the Odin Secure FTP Expert application. Specifically, by inputting a string of 108 repeated characters (such as 'A') into the connection fields of the Quickconnect site dialog, the application will crash if vulnerable."}, {'type': 'list_item', 'content': "Run a script or create a text file containing 108 repeated characters (e.g., 108 'A's)."}, {'type': 'list_item', 'content': 'Copy the content of this file to the clipboard.'}, {'type': 'list_item', 'content': 'Open OdinSecureFTPExpert.exe.'}, {'type': 'list_item', 'content': 'Navigate to Trial > Connect > Quickconnect site.'}, {'type': 'list_item', 'content': 'Paste the clipboard content into all input fields.'}, {'type': 'list_item', 'content': 'Attempt to connect and observe if the application crashes, indicating the presence of the vulnerability.'}] [2]
What immediate steps should I take to mitigate this vulnerability?
I don't know