Vulnerability CVE-2011-0418


Published: 2011-05-24   Modified: 2011-09-21

Description:
The glob implementation in Pure-FTPd before 1.0.32, and in libc in NetBSD 5.1, does not properly expand expressions containing curly brackets, which allows remote authenticated users to cause a denial of service (memory consumption) via a crafted FTP STAT command.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Multiple FTPD Server GLOB_BRACE|GLOB_LIMIT memory exhaustion
Maksymilian Arci...
02.05.2011
High
*bsd libc/glob resource exhaustion (ftpd exploit)
Maksymilian Arci...
04.03.2011
Med.
FreeBSD/GNU ftpd remote denial of service exploit
DevilTeam
31.01.2013
Med.
FreeBSD 9.1 ftpd Remote Denial of Service
Maksymilian Arci...
01.02.2013

Type:

CWE-20

(Improper Input Validation)

Vendor: Netbsd
Product: Netbsd 
Version: 5.1;
Vendor: Pureftpd
Product: Pure-ftpd 
Version:
1.0.9
1.0.8
1.0.7
1.0.6
1.0.5
1.0.4
1.0.31
1.0.30
1.0.3
1.0.29
1.0.28
1.0.27
1.0.26
1.0.25
1.0.24
1.0.22
1.0.21
1.0.20
1.0.2
1.0.19
1.0.18
1.0.17a
1.0.17
1.0.16c
1.0.16b
1.0.16a
1.0.15
1.0.14
1.0.13a
1.0.12
1.0.11
1.0.10
1.0.1
1.0.0
0.99pre2
0.99pre1
0.99b
0.99a
0.99.9
0.99.4
0.99.3
0.99.2a
0.99.2
0.99.1b
0.99.1a
0.99.1
0.99
0.98pre2
0.98pre1
0.98.7
0.98.6
0.98.5
0.98.4
0.98.3
0.98.2a
0.98.2
0.98.1
0.98-final
0.97pre5
0.97pre4
0.97pre3
0.97pre2
0.97pre1
0.97.7pre3
0.97.7pre2
0.97.7pre1
0.97.7
0.97.6
0.97.5
0.97.4
0.97.3
0.97.2
0.97.1
0.97-final
0.96pre1
0.96.1
0.96
0.95.2
0.95.1
0.95-pre4
0.95-pre3
0.95-pre2
0.95-pre1
0.95
0.94
0.93
0.92
0.91
0.90

CVSS2 => (AV:N/AC:L/Au:S/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4/10
2.9/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial

 References:
http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/glob.c.diff?r1=1.27&r2=1.28&f=h
http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/glob.c#rev1.28
https://bugzilla.redhat.com/show_bug.cgi?id=704283
http://www.vupen.com/english/advisories/2011/1273
http://www.securityfocus.com/bid/47671
http://www.pureftpd.org/project/pure-ftpd/news
http://www.mandriva.com/security/advisories?name=MDVSA-2011:094
http://securityreason.com/securityalert/8228
http://securityreason.com/achievement_securityalert/97

Related CVE
CVE-2011-3171
Directory traversal vulnerability in pure-FTPd 1.0.22 and possibly other versions, when running on SUSE Linux Enterprise Server and possibly other operating systems, when the Netware OES remote server feature is enabled, allows local users to overwri...
CVE-2011-1575
The STARTTLS implementation in ftp_parser.c in Pure-FTPd before 1.0.30 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted FTP sessions by sending a cleartext command that is processed ...
CVE-2011-0988
pure-ftpd 1.0.22, as used in SUSE Linux Enterprise Server 10 SP3 and SP4, and Enterprise Desktop 10 SP3 and SP4, when running OES Netware extensions, creates a world-writeable directory, which allows local users to overwrite arbitrary files and gain ...
CVE-2004-0656
The accept_client function in PureFTPd 1.0.18 and earlier allows remote attackers to cause a denial of service by exceeding the maximum number of connections.

Copyright 2015, cxsecurity.com