Off-by-one error in the fsp_readdir_r function in fsplib.c in fsplib before 0.9 allows remote attackers to cause a denial of service via a directory entry whose length is exactly MAXNAMLEN, which prevents a terminating null byte from being added. gFTP contains local copy of fsplib source code to support FSP protocol.
Upstream patch: http://fsp.cvs.sourceforge.net/fsp/fsplib/fsplib.c?r1=1.19&r2=1.20
"Red Hat does not consider a user assisted client crash such as this to be a security flaw."