source: https://www.securityfocus.com/bid/21714/info
FTPRush is prone to a local buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input data to an insufficiently sized buffer.
An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in denial-of-service conditions.
This issue affects version 1.0.0.610; other versions may also be vulnerable.
Supplying the following to the client GUI is sufficient to demonstrate this issue:
Host: 4131 x "A"