Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2013-7252 | A stack-based buffer overflow vulnerability exists in freeFTPd version 1.0.10 and earlier in the handling of the FTP PASS command. When an attacker sends a specially crafted password string, the application fails to validate input length, resulting in memory corruption. This can lead to denial of service or arbitrary code execution. Exploitation requires the anonymous user account to be enabled. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 31 Jul 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Freeftpd
Freeftpd freeftpd |
|
| Vendors & Products |
Freeftpd
Freeftpd freeftpd |
Thu, 31 Jul 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 31 Jul 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack-based buffer overflow vulnerability exists in freeFTPd version 1.0.10 and earlier in the handling of the FTP PASS command. When an attacker sends a specially crafted password string, the application fails to validate input length, resulting in memory corruption. This can lead to denial of service or arbitrary code execution. Exploitation requires the anonymous user account to be enabled. | |
| Title | freeFTPd <= 1.0.10 PASS Command Stack-Based Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-07-31T15:16:18.262Z
Reserved: 2025-07-30T18:00:43.227Z
Link: CVE-2013-10042
Updated: 2025-07-31T15:14:18.622Z
Status : Awaiting Analysis
Published: 2025-07-31T15:15:34.167
Modified: 2025-07-31T18:42:37.870
Link: CVE-2013-10042
No data.
OpenCVE Enrichment
Updated: 2025-07-31T19:36:24Z
EUVD