We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2012-10023

FreeFloat FTP Server USER Command Buffer Overflow



Description

A stack-based buffer overflow vulnerability exists in FreeFloat FTP Server version 1.0.0. The server fails to properly validate input passed to the USER command, allowing remote attackers to overwrite memory and potentially execute arbitrary code. The flaw is triggered by sending an overly long username string, which overflows the buffer allocated for user authentication.

Reserved 2025-08-05 | Published 2025-08-05 | Updated 2025-08-05 | Assigner VulnCheck


MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unknown

*
affected

Credits

D35m0nd142 finder

0v3r finder

References

raw.githubusercontent.com/...indows/ftp/freefloatftp_user.rb exploit

www.exploit-db.com/exploits/23243 exploit

my.saintcorporation.com/...nfo/freefloat_ftp_server_user_cmd third-party-advisory

www.exploit-db.com/exploits/15689 exploit

web.archive.org/...0029/http://secunia.com/advisories/42465/ technical-description exploit

web.archive.org/...://www.freefloat.com/sv/about-/about-.php product

www.vulncheck.com/...ftp-server-user-command-buffer-overflow third-party-advisory

cve.org (CVE-2012-10023)

nvd.nist.gov (CVE-2012-10023)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2012-10023

Support options

Helpdesk Chat, Email, Knowledgebase