Overview
CoreFTP contains a buffer overflow when parsing long directory names.
Description
CoreFTP is susceptible to a buffer overflow when parsing long directory names from a malicious FTP server. The LIST, VIEW, commands are vulnerable to a denial of service and the DELE command has been reported to be vulnerable to code execution.  | 
Impact
A user that is tricked into visiting a malicious FTP server and deleting a directory with a long name may allow arbitrary code to run on the user's computer.  | 
Solution
Apply an Update Upgrade to CoreFTP 2.2 build 1769 or later. If you are unable to upgrade, please consider the following workarounds.  | 
Use the Microsoft Enhanced Mitigation Experience Toolkit  | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | 5.1 | AV:N/AC:H/Au:N/C:P/I:P/A:P | 
| Temporal | 3.4 | E:U/RL:OF/RC:UC | 
| Environmental | 0.5 | CDP:N/TD:L/CR:L/IR:L/AR:L | 
References
Acknowledgements
Thanks to Silent Dream for reporting this vulnerability.
This document was written by Jared Allar.
Other Information
| CVE IDs: | CVE-2013-0130 | 
| Date Public: | 2013-03-21 | 
| Date First Published: | 2013-03-21 | 
| Date Last Updated: | 2013-03-21 18:55 UTC | 
| Document Revision: | 18 |