A stack-based buffer overflow vulnerability exists in freeFTPd version 1.0.10 and earlier in the handling of the FTP PASS command. When an attacker sends a specially crafted password string, the application fails to validate input length, resulting in memory corruption. This can lead to denial of service or arbitrary code execution. Exploitation requires the anonymous user account to be enabled.
History

Thu, 31 Jul 2025 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Freeftpd
Freeftpd freeftpd
Vendors & Products Freeftpd
Freeftpd freeftpd

Thu, 31 Jul 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 31 Jul 2025 15:00:00 +0000

Type Values Removed Values Added
Description A stack-based buffer overflow vulnerability exists in freeFTPd version 1.0.10 and earlier in the handling of the FTP PASS command. When an attacker sends a specially crafted password string, the application fails to validate input length, resulting in memory corruption. This can lead to denial of service or arbitrary code execution. Exploitation requires the anonymous user account to be enabled.
Title freeFTPd <= 1.0.10 PASS Command Stack-Based Buffer Overflow
Weaknesses CWE-121
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-07-31T15:16:18.262Z

Reserved: 2025-07-30T18:00:43.227Z

Link: CVE-2013-10042

cve-icon Vulnrichment

Updated: 2025-07-31T15:14:18.622Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-31T15:15:34.167

Modified: 2025-07-31T18:42:37.870

Link: CVE-2013-10042

cve-icon Redhat

No data.