A stack-based buffer overflow vulnerability exists in FreeFloat FTP Server version 1.0.0. The server fails to properly validate input passed to the USER command, allowing remote attackers to overwrite memory and potentially execute arbitrary code. The flaw is triggered by sending an overly long username string, which overflows the buffer allocated for user authentication.
Metrics
Affected Vendors & Products
References
History
Wed, 03 Sep 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Freefloat freefloat Ftp Server
|
|
CPEs | cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:* | |
Vendors & Products |
Freefloat freefloat Ftp Server
|
|
Metrics |
cvssV3_1
|
Wed, 06 Aug 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 06 Aug 2025 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Freefloat
Freefloat ftp Server |
|
Vendors & Products |
Freefloat
Freefloat ftp Server |
Tue, 05 Aug 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A stack-based buffer overflow vulnerability exists in FreeFloat FTP Server version 1.0.0. The server fails to properly validate input passed to the USER command, allowing remote attackers to overwrite memory and potentially execute arbitrary code. The flaw is triggered by sending an overly long username string, which overflows the buffer allocated for user authentication. | |
Title | FreeFloat FTP Server USER Command Buffer Overflow | |
Weaknesses | CWE-121 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-05T20:02:08.874Z
Updated: 2025-08-06T17:56:13.770Z
Reserved: 2025-08-05T13:21:21.489Z
Link: CVE-2012-10023

Updated: 2025-08-06T17:56:10.429Z

Status : Analyzed
Published: 2025-08-05T20:15:32.000
Modified: 2025-09-03T14:58:08.013
Link: CVE-2012-10023

No data.