CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability was found in FreeFloat FTP Server 1.0 and classified as critical. This issue affects some unknown processing of the component RESTART Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Analysis
Critical buffer overflow vulnerability in the RESTART Command Handler of FreeFloat FTP Server 1.0 that allows unauthenticated remote attackers to cause denial of service and potentially achieve information disclosure or integrity compromise. The vulnerability is classified as critical by the vendor, has a disclosed proof-of-concept, and poses immediate risk to exposed FTP servers; however, the CVSS 7.3 score reflects moderate actual impact (low confidentiality, integrity, and availability) rather than critical severity.
Technical Context
FreeFloat FTP Server is a Windows-based FTP daemon that implements RFC 959 FTP protocol. The vulnerability exists in the RESTART (REST) command handler, which is responsible for setting the restart/resume point for file transfers. The ROOT CAUSE is CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), a classic stack or heap buffer overflow. When a malformed REST command with an oversized argument is sent to the FTP server, the handler fails to properly validate input length before copying data into a fixed-size buffer. Since FTP RESTART commands are part of the core protocol and require no authentication (RFC 959 specifies REST as a non-authenticated command), any network-accessible FTP server is vulnerable. The affected CPE would be: cpe:2.3:a:freefloat:freefloat_ftp_server:1.0:*:*:*:*:*:*:* (exact CPE not provided in source but inferred from description). The buffer overflow occurs in memory space controlled by the FTP service process, potentially enabling code execution or crash-based DoS.
Affected Products
PRODUCT: FreeFloat FTP Server, VERSION: 1.0 (explicitly stated; earlier or later versions status unknown from description). AFFECTED COMPONENT: RESTART Command Handler (RFC 959 REST command). DEPLOYMENT: Primarily Windows systems. NO VENDOR ADVISORY LINK PROVIDED in the source data, but affected organizations should check FreeFloat website (freefloat.com or legacy archives) for security bulletins. NOTE: FreeFloat FTP Server is legacy software; vendor support status unclear and patches may not exist or may require version upgrade. Organizations using this product should conduct a full inventory of exposed instances.
Remediation
PRIMARY: Upgrade to a patched version of FreeFloat FTP Server if available from vendor (vendor advisory must be consulted—none provided in source). SECONDARY (if no patch exists): (1) Disable FTP service entirely and migrate to SFTP/SSH File Transfer (recommended); (2) Restrict FTP port access via firewall to trusted internal networks only; (3) Run FTP service under a least-privilege account to limit code execution impact; (4) Monitor FTP logs for suspicious REST commands (e.g., unusually long arguments); (5) Deploy intrusion detection signatures to alert on malformed RESTART commands; (6) Consider WAF/IPS rules to drop REST commands with payloads exceeding normal size limits (typically <10 bytes for numeric arguments). PATCH STATUS: Unknown—organization must contact FreeFloat vendor directly. Given the age of FreeFloat 1.0, vendor may have ceased support; in this case, migration to modern FTP/SFTP alternatives is mandatory.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17004