CVE-2012-10035
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-08-05
Last updated on: 2025-08-07
Assigner: VulnCheck
Description
Description
Turbo FTP Server versions 1.30.823 and 1.30.826 contain a buffer overflow vulnerability in the handling of the PORT command. By sending a specially crafted payload, an unauthenticated remote attacker can overwrite memory structures and execute arbitrary code with SYSTEM privileges.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| turbo | ftp_server | 1.30.823 |
| turbo | ftp_server | 1.30.826 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
Turbo FTP Server versions 1.30.823 and 1.30.826 have a buffer overflow vulnerability in the handling of the PORT command. An unauthenticated remote attacker can send a specially crafted payload to overwrite memory structures and execute arbitrary code with SYSTEM privileges.
How can this vulnerability impact me? :
This vulnerability allows an unauthenticated remote attacker to execute arbitrary code with SYSTEM privileges on the affected server, potentially leading to full system compromise, unauthorized access, data theft, or disruption of services.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70