CVE-2012-10023
Severity CVSS v4.0:
MEDIUM
Type:
CWE-121
Stack-based Buffer Overflow
Publication date:
05/08/2025
Last modified:
03/09/2025
Description
A stack-based buffer overflow vulnerability exists in FreeFloat FTP Server version 1.0.0. The server fails to properly validate input passed to the USER command, allowing remote attackers to overwrite memory and potentially execute arbitrary code. The flaw is triggered by sending an overly long username string, which overflows the buffer allocated for user authentication.
Impact
Base Score 4.0
6.90
Severity 4.0
MEDIUM
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://my.saintcorporation.com/cgi-bin/exploit_info/freefloat_ftp_server_user_cmd
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/freefloatftp_user.rb
- https://web.archive.org/web/20101208040029/http://secunia.com/advisories/42465/
- https://web.archive.org/web/20101213050627/http://www.freefloat.com/sv/about-/about-.php
- https://www.exploit-db.com/exploits/15689
- https://www.exploit-db.com/exploits/23243
- https://www.vulncheck.com/advisories/freefloat-ftp-server-user-command-buffer-overflow
- https://www.exploit-db.com/exploits/23243



