A stack-based buffer overflow vulnerability exists in freeFTPd version 1.0.10 and earlier in the handling of the FTP PASS command. When an attacker sends a specially crafted password string, the application fails to validate input length, resulting in memory corruption. This can lead to denial of service or arbitrary code execution. Exploitation requires the anonymous user account to be enabled.
Metrics
Affected Vendors & Products
References
History
Thu, 31 Jul 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Freeftpd
Freeftpd freeftpd |
|
Vendors & Products |
Freeftpd
Freeftpd freeftpd |
Thu, 31 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 31 Jul 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A stack-based buffer overflow vulnerability exists in freeFTPd version 1.0.10 and earlier in the handling of the FTP PASS command. When an attacker sends a specially crafted password string, the application fails to validate input length, resulting in memory corruption. This can lead to denial of service or arbitrary code execution. Exploitation requires the anonymous user account to be enabled. | |
Title | freeFTPd <= 1.0.10 PASS Command Stack-Based Buffer Overflow | |
Weaknesses | CWE-121 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-07-31T15:16:18.262Z
Reserved: 2025-07-30T18:00:43.227Z
Link: CVE-2013-10042

Updated: 2025-07-31T15:14:18.622Z

Status : Awaiting Analysis
Published: 2025-07-31T15:15:34.167
Modified: 2025-07-31T18:42:37.870
Link: CVE-2013-10042

No data.