Skip to content
Threat Feed
high advisory

FTP Shell Server 6.83 Buffer Overflow Vulnerability (CVE-2019-25619)

FTP Shell Server 6.83 contains a buffer overflow vulnerability (CVE-2019-25619) in the 'Account name to ban' field, enabling a local attacker to execute arbitrary code by injecting shellcode through a crafted string in the Manage FTP Accounts dialog.

FTP Shell Server version 6.83 is vulnerable to a buffer overflow (CVE-2019-25619). This vulnerability exists within the ‘Account name to ban’ field, located in the Manage FTP Accounts dialog. A local attacker can exploit this flaw by providing a specially crafted string as the account name. This crafted string allows for shellcode injection, enabling the attacker to overwrite the return address within the application’s memory. Successful exploitation allows an attacker to execute arbitrary…

Detection coverage 2

Detect FTP Shell Server Calc.exe Execution

high

Detects the execution of calc.exe spawned by ftpshell.exe, indicating potential exploitation of CVE-2019-25619.

sigma tactics: execution techniques: T1059.001 sources: process_creation, windows

Detect FTP Shell Server Suspicious Process

medium

Detects the execution of command interpreter spawned by ftpshell.exe, indicating potential exploitation.

sigma tactics: execution techniques: T1059.001 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →