Rumba FTP 4.x Security Update

Rumba FTP 4.x Security Update

Micro Focus Rumba FTP Security update

Overview

This security update is covered by:

  • CVE-2016-5764 – Micro Focus Rumba  FTP 4.X client  buffer overflow makes it possible to corrupt the stack
  • CVE-2016-5228 – Rumba 9.x stack buffer overflow vulnerability.
  • CVE-2016-1606 – Rumba 9.4 stack buffer overflow vulnerabilities.

Affected Products

Micro Focus Rumba FTP 4.X client

Description

This security update addresses potential issues caused by a buffer overflow in Micro Focus FTP 4.X clients making it possible to corrupt the stack and allow arbitrary code execution.

Fixed in

Rumba FTP 4.5 (HF 14668)

Thanks

We would like to give special thanks to Umit Aksu (aksuumit@hotmail.com) , who discovered this vulnerability and reported it to us.

DISCLAIMER:

Some content on Community Tips & Information pages is not officially supported by Micro Focus. Please refer to our Terms of Use for more detail.
Version history
Revision #:
1 of 1
Last update:
‎2016-10-19 17:51
Updated by:
 
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.