Overview

Welcome to the homepage of FileZilla, the free FTP solution. Both a client and a server are available. FileZilla is open source software distributed free of charge under the terms of the GNU General Public License

Support is available through our forums, the wiki and the bug and feature request trackers.

In addition, you will find documentation on how to compile FileZilla and nightly builds for multiple platforms in the development section.

Quick download links

Pick the client if you want to transfer files. Get the server if you want to make files available for others.

News Atom feed icon

2013-08-07 - FileZilla Client 3.7.3 released

Fixed vulnerabilities:

  • Merge further fixes from PuTTY to address CVE-2013-4206, CVE-2013-4207, CVE-2013-4208

2013-08-06 - FileZilla Client 3.7.2 released

Fixed vulnerabilities:

  • Apply a fix for a security vulnerability in PuTTY as used in FileZilla to handle SFTP. See CVE-2013-4852 for reference.

Bugfixes and minor changes:

  • Provided Linux binaries are now built against Debian Wheezy

2013-07-02 - FileZilla Client 3.7.1.1 released

Bugfixes and minor changes:

  • Minor bump for installer changes

2010-01-02 - Subversion repository moved

The address of the subversion repository has changed.

The old address, http(s)://filezilla.svn.sourceforge.net/svnroot/filezilla is no longer valid. The new address is http(s)://svn.filezilla-project.org/svn/

The new repository can be browsed using http://svn.filezilla-project.org/filezilla/.

2009-03-03 - Security advisory

FileZilla Server 0.9.31 fixes a buffer overflow in the SSL/TLS code.

This vulnerability could potentially be used for denial of service attacks.

Affected versions

All versions prior to 0.9.31 are affected. This vulnerability has been fixed in 0.9.31

2008-07-24 - Security Advisory

FileZilla 3.1.0.1 fixes a vulnerability regarding the way some errors are handled on SSL/TLS secured data transfers.

If the data connection of a transfer gets closed, FileZilla did not check if the server performed an orderly TLS shutdown.

Impact

An attacker could send spoofed FIN packets to the client. Even though GnuTLS detects this with GNUTLS_E_UNEXPECTED_PACKET_LENGTH, FileZilla did not record a transfer failure in all cases.

Unfortunately not all servers perform an orderly SSL/TLS shutdown. Since this cannot be distinguished from an attack, FileZilla will not be able to download listings or files from such servers.

Affected versions

All versions prior to 3.1.0.1 are affected. This vulnerability has been fixed in 3.1.0.1