CVE-2012-10023
BaseFortify
Publication date: 2025-08-05
Last updated on: 2025-09-03
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| freefloat | freefloat_ftp_server | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stack-based buffer overflow in FreeFloat FTP Server version 1.0.0. It occurs because the server does not properly validate the input passed to the USER command. An attacker can send an overly long username string that overflows the buffer allocated for user authentication, potentially allowing the attacker to overwrite memory and execute arbitrary code remotely.
How can this vulnerability impact me? :
The vulnerability can allow remote attackers to execute arbitrary code on the affected server by sending a specially crafted username string. This can lead to unauthorized access, control over the server, data compromise, or disruption of services.