Secunia Research has discovered a vulnerability in Serv-U, which can be exploited by malicious people to potentially compromise a vulnerable system. The vulnerability is caused by a boundary error in a function when processing a hexadecimal representation of a string using a TEA decoding algorithm. This can be exploited to cause a stack-based buffer overflow by passing an overly long string. Successful exploitation may allow execution of arbitrary code. Version 9.0.0.5 is affected.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/82789/secunia-servutea.txt
Source: https://packetstormsecurity.com/files/82789/RhinoSoft-Serv-U-TEA-Decoding-Buffer-Overflow.html

