Seagull FTP Client <= v3.3 Build 409 contains a stack-based buffer overflow vulnerability in its FTP directory listing parser. When the client connects to an FTP server and receives a crafted response to a LIST command containing an excessively long filename, the application fails to properly validate input length, resulting in a buffer overflow that overwrites the Structured Exception Handler (SEH). This may allow remote attackers to execute arbitrary code on the client system. This product line was discontinued and users were advised to use BlueZone Secure FTP instead, at the time of disclosure.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 27 Aug 2025 11:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Rocketsoftware Rocketsoftware seagull Ftp | |
| Vendors & Products | Rocketsoftware Rocketsoftware seagull Ftp | 
Fri, 22 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Thu, 21 Aug 2025 20:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Seagull FTP Client <= v3.3 Build 409 contains a stack-based buffer overflow vulnerability in its FTP directory listing parser. When the client connects to an FTP server and receives a crafted response to a LIST command containing an excessively long filename, the application fails to properly validate input length, resulting in a buffer overflow that overwrites the Structured Exception Handler (SEH). This may allow remote attackers to execute arbitrary code on the client system. This product line was discontinued and users were advised to use BlueZone Secure FTP instead, at the time of disclosure. | |
| Title | Seagull FTP v3.3 Build 409 Stack Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |  | 
 | 
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-21T20:13:54.911Z
Updated: 2025-08-22T15:15:45.148Z
Reserved: 2025-08-19T21:25:44.259Z
Link: CVE-2010-20007
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-08-22T15:15:32.254Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-08-21T21:15:33.267
Modified: 2025-08-22T18:08:51.663
Link: CVE-2010-20007
 Redhat
                        Redhat
                    No data.