Vulnerability & Exploit Database

Back to search

Free Float FTP Server USER Command Buffer Overflow

Freefloat FTP Server is prone to an overflow condition. It fails to properly sanitize user-supplied input resulting in a stack-based buffer overflow. With a specially crafted 'USER' command, a remote attacker can potentially have an unspecified impact.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/windows/ftp/freefloatftp_user

Authors

  • D35m0nd142
  • Doug Prostko <dougtko [at] gmail.com>

References

Targets

  • FreeFloat / Windows XP SP3

Platforms

  • windows

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/ftp/freefloatftp_user msf exploit(freefloatftp_user) > show targets ...targets... msf exploit(freefloatftp_user) > set TARGET <target-id> msf exploit(freefloatftp_user) > show options ...show and set options... msf exploit(freefloatftp_user) > exploit