Seagull FTP Client <= v3.3 Build 409 contains a stack-based buffer overflow vulnerability in its FTP directory listing parser. When the client connects to an FTP server and receives a crafted response to a LIST command containing an excessively long filename, the application fails to properly validate input length, resulting in a buffer overflow that overwrites the Structured Exception Handler (SEH). This may allow remote attackers to execute arbitrary code on the client system. This product line was discontinued and users were advised to use BlueZone Secure FTP instead, at the time of disclosure.
History

Wed, 27 Aug 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Rocketsoftware
Rocketsoftware seagull Ftp
Vendors & Products Rocketsoftware
Rocketsoftware seagull Ftp

Fri, 22 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 21 Aug 2025 20:30:00 +0000

Type Values Removed Values Added
Description Seagull FTP Client <= v3.3 Build 409 contains a stack-based buffer overflow vulnerability in its FTP directory listing parser. When the client connects to an FTP server and receives a crafted response to a LIST command containing an excessively long filename, the application fails to properly validate input length, resulting in a buffer overflow that overwrites the Structured Exception Handler (SEH). This may allow remote attackers to execute arbitrary code on the client system. This product line was discontinued and users were advised to use BlueZone Secure FTP instead, at the time of disclosure.
Title Seagull FTP v3.3 Build 409 Stack Buffer Overflow
Weaknesses CWE-121
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-08-22T15:15:45.148Z

Reserved: 2025-08-19T21:25:44.259Z

Link: CVE-2010-20007

cve-icon Vulnrichment

Updated: 2025-08-22T15:15:32.254Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-21T21:15:33.267

Modified: 2025-08-22T18:08:51.663

Link: CVE-2010-20007

cve-icon Redhat

No data.