This Metasploit module exploits a stack-based buffer overflow vulnerability in BulletProof FTP Client 2010, caused by an overly long hostname. By persuading the victim to open a specially-crafted .BPS file, a remote attacker could execute arbitrary code on the system or cause the application to crash. This Metasploit module has been tested successfully on Windows XP SP3.
e5d33406aeb9e2aa88598b1dd18462a9ef67a59bb67577584d10ed7cf7894210
BulletProof FTP Client 2010 SEH buffer overflow exploit that affects version 2010.75.0.76.
768ac5c85705858de901eded228cb32ca920c358f2b0b48fd7cc80cc6fee9a4a
BulletProof FTP Client 2010 version 2010.75.0.76 SEH buffer overflow exploit.
2aa1fbd49d908246691afe7fb9133077bb9d1e082d76d96aa1e68d7ce52bb786
BulletProof FTP Client 2010 suffers from a buffer overflow vulnerability.
a3e7475d74bd6f99e53fd8483d4127bbad6e74912100255cd47b89d09a52540d