ID CVE-2014-2973
Summary ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-5753. Reason: This candidate is a duplicate of CVE-2008-5753. Notes: All CVE users should reference CVE-2008-5753 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
References
Vulnerable Configurations
CVSS
Base:
Impact:
Exploitability:
exploit-db via4
  • description BulletProof FTP Client 2010 - Buffer Overflow (SEH) Exploit. CVE-2014-2973. Dos exploit for windows platform
    id EDB-ID:34540
    last seen 2016-02-03
    modified 2014-09-05
    published 2014-09-05
    reporter Robert Kugler
    source https://www.exploit-db.com/download/34540/
    title BulletProof FTP Client 2010 - Buffer Overflow SEH Exploit
  • description BulletProof FTP Client BPS Buffer Overflow. CVE-2014-2973. Local exploit for windows platform
    id EDB-ID:35712
    last seen 2016-02-04
    modified 2015-01-06
    published 2015-01-06
    reporter metasploit
    source https://www.exploit-db.com/download/35712/
    title BulletProof FTP Client BPS Buffer Overflow
  • description BulletProof FTP Client 2010 - Buffer Overflow (SEH). CVE-2014-2973. Dos exploit for windows platform
    id EDB-ID:34162
    last seen 2016-02-03
    modified 2014-07-24
    published 2014-07-24
    reporter Gabor Seljan
    source https://www.exploit-db.com/download/34162/
    title BulletProof FTP Client 2010 - Buffer Overflow SEH
  • description BulletProof FTP Client 2010 - Buffer Overflow (SEH) Exploit. CVE-2014-2973. Local exploit for windows platform
    id EDB-ID:35449
    last seen 2016-02-04
    modified 2014-12-03
    published 2014-12-03
    reporter Muhamad Fadzil Ramli
    source https://www.exploit-db.com/download/35449/
    title BulletProof FTP Client 2010 - Buffer Overflow SEH Exploit
metasploit via4
description This module exploits a stack-based buffer overflow vulnerability in BulletProof FTP Client 2010, caused by an overly long hostname. By persuading the victim to open a specially-crafted .BPS file, a remote attacker could execute arbitrary code on the system or cause the application to crash. This module has been tested successfully on Windows XP SP3.
id MSF:EXPLOIT/WINDOWS/FILEFORMAT/BPFTP_CLIENT_BPS_BOF
last seen 2019-03-15
modified 2017-07-24
published 2014-12-20
reliability Normal
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/bpftp_client_bps_bof.rb
title BulletProof FTP Client BPS Buffer Overflow
packetstorm via4
Last major update 15-12-2014 - 13:59
Published 15-12-2014 - 13:59
Back to Top