NFTP client Buffer Overflow (CVE-2019-25361)
CVE-2019-25361
Ayukov NFTP client 1.71 contains a buffer overflow vulnerability in the SYST command handling that allows remote attackers to execute arbitrary code. Attackers can send a specially crafted SYST comman...
Overview
A critical security flaw has been identified in the Ayukov NFTP client version 1.71. This vulnerability allows a remote attacker to take complete control of a user’s system by exploiting a weakness in how the client processes a specific FTP command.
Vulnerability Explanation
In simple terms, the NFTP client has a programming error in its handling of the SYST command, which is a standard FTP command used to query a server’s operating system. The client does not properly check the size of the data it receives in response to this command. A malicious FTP server can send a specially crafted, oversized SYST response that overflows a memory buffer in the client software. This overflow can be manipulated to inject and execute malicious code on the victim’s machine.
Impact and Risk
The impact of this vulnerability is severe. By convincing a user to connect to a malicious FTP server (which could be disguised as a legitimate file repository), an attacker can exploit this flaw to execute arbitrary code on the victim’s computer with the same privileges as the user running the NFTP client. In documented cases, this exploit has been used to install a “bind shell,” opening a backdoor network port (5150) that gives the attacker persistent, remote command-line access to the compromised system. This can lead to data theft, installation of ransomware or other malware, and the system being used as a foothold for further attacks within a network.
Remediation and Mitigation
Immediate action is required to protect affected systems.
Primary Remediation:
- Upgrade or Replace: The NFTP client version 1.71 is vulnerable. Users must immediately upgrade to a patched version if one is available from the vendor. If a patch is not available, discontinue use of Ayukov NFTP 1.71 and switch to a different, maintained FTP client.
Mitigation Steps:
- Network Controls: Implement egress firewall rules at the network perimeter to block outbound TCP port 5150. This can prevent the specific bind shell from establishing a connection back to the attacker, though it does not fix the underlying vulnerability.
- User Awareness: Advise users to exercise extreme caution when connecting to untrusted or unfamiliar FTP servers. The exploit requires a connection to a malicious server to be triggered.
- Principle of Least Privilege: Ensure users do not run the NFTP client with administrative privileges. This can limit the scope of damage if an exploit occurs.
- Monitor for Compromise: Monitor network traffic for unexpected connections on port 5150 and inspect systems for suspicious processes or files, as exploitation may have already occurred.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 9110, W920, W930, W1000, Mod...
HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx before 22.1s6, and Cosy+ with firmware 23.xx before 23.0s3 have a stack buffer overflow that leads to a Denial of Service...
Aida64 Engineer 6.10.5200 contains a buffer overflow vulnerability in the CSV logging configuration that allows attackers to execute malicious code by crafting a specially designed payload. Attackers ...
MailCarrier 2.51 contains a buffer overflow vulnerability in the POP3 USER command that allows remote attackers to execute arbitrary code. Attackers can send a crafted oversized buffer to the POP3 ser...