AmmSoft's ScriptFTP client is susceptible to a remote buffer overflow vulnerability that is triggered when processing a sufficiently long filename during a FTP LIST command resulting in overwriting the exception handler. Social engineering of executing a specially crafted ftp file by double click will result in connecting to our malicious server and perform arbitrary code execution which allows the attacker to gain the same rights as the user running ScriptFTP.
83a230051d7cd6708a4d86afbe83ebbe437a5ab42fac5587f0c6034133b2f3f5
Secunia Security Advisory - Digital Echidna has discovered a vulnerability in ScriptFTP, which can be exploited by malicious people to compromise a user's system.
15dd888f5508ec389cb1cb027e6758c75256873af4164a6cb84d5d6185081f65
ScriptFTP versions 3.3 and below suffer from a buffer overflow vulnerability.
4c3d7bd282a71bbc0d04ab728ecd6d649b96ed1e7f9337d132ef2569f82dde80