RSS   Vulnerabilities for 'Pure-ftpd'   RSS

2017-09-21
 
CVE-2017-12170

CWE-noinfo
 

 
Downstream version 1.0.46-1 of pure-ftpd as shipped in Fedora was vulnerable to packaging error due to which the original configuration was ignored after update and service started running with default configuration. This has security implications because of overriding security-related configuration. This issue doesn't affect upstream version of pure-ftpd.

 
2011-11-04
 
CVE-2011-3171

CWE-22
 

 
Directory traversal vulnerability in pure-FTPd 1.0.22 and possibly other versions, when running on SUSE Linux Enterprise Server and possibly other operating systems, when the Netware OES remote server feature is enabled, allows local users to overwrite arbitrary files via unknown vectors.

 
2011-05-23
 
CVE-2011-1575

CWE-399
 

 
The STARTTLS implementation in ftp_parser.c in Pure-FTPd before 1.0.30 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted FTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.

 
2011-04-18
 
CVE-2011-0988

CWE-264
 

 
pure-ftpd 1.0.22, as used in SUSE Linux Enterprise Server 10 SP3 and SP4, and Enterprise Desktop 10 SP3 and SP4, when running OES Netware extensions, creates a world-writeable directory, which allows local users to overwrite arbitrary files and gain privileges via unspecified vectors.

 
2011-05-24
 
CVE-2011-0418

CWE-20
 

 
The glob implementation in Pure-FTPd before 1.0.32, and in libc in NetBSD 5.1, does not properly expand expressions containing curly brackets, which allows remote authenticated users to cause a denial of service (memory consumption) via a crafted FTP STAT command.

 

 >>> Vendor: Pureftpd 2 Products
Pureftpd
Pure-ftpd


Copyright 2019, cxsecurity.com

 

Back to Top