CVE-2019-25614

Free Float · FTP Server

Free Float FTP 1.0 contains a buffer overflow in the STOR command handler, enabling remote attackers to execute arbitrary code via a crafted payload.

Executive summary

A critical buffer overflow vulnerability in Free Float FTP 1.0 allows remote attackers to execute arbitrary code with the privileges of the FTP service.

Vulnerability

This is a stack-based buffer overflow vulnerability residing in the STOR command handler. An attacker can authenticate using anonymous credentials and send a malicious STOR request containing 247 bytes of padding followed by a return address and shellcode to hijack the execution flow.

Business impact

The impact of this vulnerability is severe, as it allows for Remote Code Execution (RCE) on the host server. An attacker gaining code execution can move laterally through the network, steal sensitive data, or deploy ransomware. The CVSS score of 9.8 reflects the ease of exploitation (anonymous access) and the total loss of system confidentiality, integrity, and availability.

Remediation

Immediate Action: Discontinue the use of Free Float FTP 1.0 immediately and migrate to a modern, supported FTP or SFTP solution, as this software is legacy and highly insecure.

Proactive Monitoring: Monitor network traffic for oversized FTP STOR commands and review server logs for unexpected service crashes or unauthorized shell activity.

Compensating Controls: If immediate decommissioning is not possible, restrict FTP access to known IP addresses via a firewall and disable anonymous authentication.

Exploitation status

Public Exploit Available: true

Analyst recommendation

Given that Free Float FTP 1.0 is an obsolete product with known public exploits, the only viable recommendation is to replace it immediately. The presence of a 9.8 CVSS score and public exploit code makes this a high-priority target for attackers.