Vulnerability Details : CVE-2003-0558
Public exploit exists!
Buffer overflow in LeapFTP 2.7.3.600 allows remote FTP servers to execute arbitrary code via a long IP address response to a PASV request.
Vulnerability category: OverflowExecute code
Products affected by CVE-2003-0558
- cpe:2.3:a:leapware:leapftp:2.7.3.600:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2003-0558
75.78%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2003-0558
-
LeapWare LeapFTP v2.7.3.600 PASV Reply Client Overflow
Disclosure Date: 2003-06-09First seen: 2020-04-26exploit/windows/ftp/leapftp_pasv_replyThis module exploits a buffer overflow in the LeapWare LeapFTP v2.7.3.600 client that is triggered through an excessively long PASV reply command. This module was ported from the original exploit by drG4njubas with minor improvements. Authors: - aushack <patrick@o
CVSS scores for CVE-2003-0558
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2003-0558
Jump to