{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2019-25588","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2026-03-21T16:46:27.878Z","datePublished":"2026-03-22T00:11:09.625Z","dateUpdated":"2026-03-24T15:14:57.186Z"},"containers":{"cna":{"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-03-22T00:15:31.176Z"},"title":"BulletProof FTP Server 2019.0.0.50 Denial of Service via DNS Address","descriptions":[{"lang":"en","value":"BulletProof FTP Server 2019.0.0.50 contains a denial of service vulnerability in the DNS Address field that allows local attackers to crash the application by supplying an excessively long string. Attackers can enable the DNS Address option in the Firewall settings and paste a buffer of 700 bytes to trigger a crash when the Test function is invoked."}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Assumed-Immutable Data is Stored in Writable Memory","cweId":"CWE-1282","type":"CWE"}]}],"affected":[{"vendor":"Bpftpserver","product":"BulletProof FTP Server","versions":[{"version":"2019.0.0.50","status":"affected"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"LOCAL","baseScore":6.9,"baseSeverity":"MEDIUM","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS"},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.2,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS"}],"references":[{"url":"https://www.exploit-db.com/exploits/46875","name":"ExploitDB-46875","tags":["exploit"]},{"url":"http://bpftpserver.com/","name":"Official Product Homepage","tags":["product"]},{"url":"http://bpftpserver.com/products/bpftpserver/windows/download","name":"Product Reference","tags":["product"]},{"name":"VulnCheck Advisory: BulletProof FTP Server 2019.0.0.50 Denial of Service via DNS Address","tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/bulletproof-ftp-server-denial-of-service-via-dns-address"}],"credits":[{"lang":"en","value":"Victor Mondragón","type":"finder"}],"x_generator":{"engine":"vulncheck"},"datePublic":"2019-05-20T00:00:00.000Z"},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-24T14:01:17.488103Z","id":"CVE-2019-25588","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-24T15:14:57.186Z"}}]}}