CVE-2012-10023
A stack-based buffer overflow vulnerability exists in FreeFloat FTP Server version 1.0.0. The server fails to properly validate input passed to the USER command, allowing remote attackers to overwrite memory and potentially execute arbitrary code. The flaw is triggered by sending an overly long username string, which overflows the buffer allocated for user authentication.
Vendor
Product
CWE
Yayın Tarihi
2025-08-05 20:15:32
Güncelleme
2025-09-03 14:58:08
Source Identifier
disclosure@vulncheck.com
KEV Date Added
-
Kategoriler
Referanslar
https://my.saintcorporation.com/cgi-bin/exploit_info/freefloat_ftp_server_user_cmd
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/freefloatftp_user.rb
https://web.archive.org/web/20101208040029/http://secunia.com/advisories/42465/
https://web.archive.org/web/20101213050627/http://www.freefloat.com/sv/about-/about-.php
https://www.exploit-db.com/exploits/15689
https://www.exploit-db.com/exploits/23243
https://www.vulncheck.com/advisories/freefloat-ftp-server-user-command-buffer-overflow
https://www.exploit-db.com/exploits/23243