CVE-2012-10055
Severity CVSS v4.0:
CRITICAL
Type:
CWE-134
Format String Vulnerability
Publication date:
13/08/2025
Last modified:
14/08/2025
Description
ComSndFTP FTP Server version 1.3.7 Beta contains a format string vulnerability in its handling of the USER command. By sending a specially crafted username containing format specifiers, a remote attacker can overwrite a hardcoded function pointer in memory (specifically WSACleanup from Ws2_32.dll). This allows the attacker to redirect execution flow and bypass DEP protections using a ROP chain, ultimately leading to arbitrary code execution. The vulnerability is exploitable without authentication and affects default configurations.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
References to Advisories, Solutions, and Tools
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb
- https://web.archive.org/web/20120317214524/http://ftp.comsnd.com/
- https://www.exploit-db.com/exploits/19024
- https://www.exploit-db.com/exploits/19177
- https://www.vulncheck.com/advisories/comsndftp-user-format-string-rce
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb
- https://www.exploit-db.com/exploits/19024
- https://www.exploit-db.com/exploits/19177



