A stack-based buffer overflow vulnerability exists in FreeFloat FTP Server version 1.0.0. The server fails to properly validate input passed to the USER command, allowing remote attackers to overwrite memory and potentially execute arbitrary code. The flaw is triggered by sending an overly long username string, which overflows the buffer allocated for user authentication.
Metrics
Affected Vendors & Products
References
History
Wed, 06 Aug 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 06 Aug 2025 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Freefloat
Freefloat ftp Server |
|
Vendors & Products |
Freefloat
Freefloat ftp Server |
Tue, 05 Aug 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A stack-based buffer overflow vulnerability exists in FreeFloat FTP Server version 1.0.0. The server fails to properly validate input passed to the USER command, allowing remote attackers to overwrite memory and potentially execute arbitrary code. The flaw is triggered by sending an overly long username string, which overflows the buffer allocated for user authentication. | |
Title | FreeFloat FTP Server USER Command Buffer Overflow | |
Weaknesses | CWE-121 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-05T20:02:08.874Z
Updated: 2025-08-06T17:56:13.770Z
Reserved: 2025-08-05T13:21:21.489Z
Link: CVE-2012-10023

Updated: 2025-08-06T17:56:10.429Z

Status : Awaiting Analysis
Published: 2025-08-05T20:15:32.000
Modified: 2025-08-06T18:15:27.353
Link: CVE-2012-10023

No data.