๐Ÿ” CVE Alert

CVE-2010-20007

UNKNOWN 0.0

Seagull FTP v3.3 Build 409 Stack Buffer Overflow

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Seagull FTP Client <= v3.3 Build 409 contains a stack-based buffer overflow vulnerability in its FTP directory listing parser. When the client connects to an FTP server and receives a crafted response to a LIST command containing an excessively long filename, the application fails to properly validate input length, resulting in a buffer overflow that overwrites the Structured Exception Handler (SEH). This may allow remote attackers to execute arbitrary code on the client system. This product line was discontinued and users were advised to use BlueZone Secure FTP instead, at the time of disclosure.

CWE CWE-121
Vendor rocket software
Product seagull ftp client
Published Aug 21, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for rocket software seagull ftp client

Be the first to know when new unknown vulnerabilities affecting rocket software seagull ftp client are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Rocket Software / Seagull FTP Client
* โ‰ค 3.3 Build 409

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/seagull_list_reply.rb exploit-db.com: https://www.exploit-db.com/exploits/16705 web.archive.org: https://web.archive.org/web/20111016194057/https://www.corelan.be/index.php/2010/10/12/death-of-an-ftp-client/ web.archive.org: https://web.archive.org/web/20120102094617/http://bluezone.rocketsoftware.com/products/secure-managed-file-transfer/bz-secure-ftp/at-a-glance www3.rocketsoftware.com: https://www3.rocketsoftware.com/bluezone/help/v34/sftp/sftp.htm vulncheck.com: https://www.vulncheck.com/advisories/seagull-ftp-stack-buffer-overflow

Credits

corelanc0d3r of Corelan Team