Numeric Errors The advisory has been revoked - it doesn't affect any version of package filezilla  (opens in a new tab)


Threat Intelligence

EPSS
2.14% (89th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU1604-FILEZILLA-330345
  • published19 Aug 2013
  • disclosed19 Aug 2013

Introduced: 19 Aug 2013

CVE-2013-4852  (opens in a new tab)
CWE-189  (opens in a new tab)

Amendment

The Ubuntu security team deemed this advisory irrelevant for Ubuntu:16.04.

NVD Description

Note: Versions mentioned in the description apply only to the upstream filezilla package and not the filezilla package as distributed by Ubuntu.

Integer overflow in PuTTY 0.62 and earlier, WinSCP before 5.1.6, and other products that use PuTTY allows remote SSH servers to cause a denial of service (crash) and possibly execute arbitrary code in certain applications that use PuTTY via a negative size value in an RSA key signature during the SSH handshake, which triggers a heap-based buffer overflow.