A stack-based buffer overflow vulnerability exists in FreeFloat FTP Server version 1.0.0. The server fails to properly validate input passed to the USER command, allowing remote attackers to overwrite memory and potentially execute arbitrary code. The flaw is triggered by sending an overly long username string, which overflows the buffer allocated for user authentication.
References
Configurations
History
03 Sep 2025, 14:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:* | |
First Time |
Freefloat freefloat Ftp Server
Freefloat |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://my.saintcorporation.com/cgi-bin/exploit_info/freefloat_ftp_server_user_cmd - Third Party Advisory | |
References | () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/freefloatftp_user.rb - Exploit | |
References | () https://web.archive.org/web/20101208040029/http://secunia.com/advisories/42465/ - Third Party Advisory | |
References | () https://web.archive.org/web/20101213050627/http://www.freefloat.com/sv/about-/about-.php - Product | |
References | () https://www.exploit-db.com/exploits/15689 - Exploit | |
References | () https://www.exploit-db.com/exploits/23243 - Exploit | |
References | () https://www.vulncheck.com/advisories/freefloat-ftp-server-user-command-buffer-overflow - Third Party Advisory |
06 Aug 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.exploit-db.com/exploits/23243 - | |
Summary |
|
05 Aug 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-05 20:15
Updated : 2025-09-03 14:58
NVD link : CVE-2012-10023
Mitre link : CVE-2012-10023
CVE.ORG link : CVE-2012-10023
JSON object : View
Products Affected
freefloat
- freefloat_ftp_server
CWE
CWE-121
Stack-based Buffer Overflow