CVE-2016-20046 PUBLISHED

zFTP Client 20061220+dfsg3-4.1 Local Buffer Overflow

Assigner: VulnCheck
Reserved: 28.03.2026 Published: 28.03.2026 Updated: 28.03.2026

zFTP Client 20061220+dfsg3-4.1 contains a buffer overflow vulnerability in the NAME parameter handling of FTP connections that allows local attackers to crash the application or execute arbitrary code. Attackers can supply an oversized NAME value exceeding the 80-byte buffer allocated in strcpy_chk to overwrite the instruction pointer and execute shellcode with user privileges.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.6

Product Status

Vendor zFTP
Product zFTP Client
Versions
  • Version 20061220+dfsg3-4.1 is affected

Credits

  • Juan Sacco - http://www.exploitpack.com - finder

References

Problem Types

  • Out-of-bounds Write CWE