Vulnerability CVE-2011-0418


Published: 2011-05-24   Modified: 2012-02-13

Description:
The glob implementation in Pure-FTPd before 1.0.32, and in libc in NetBSD 5.1, does not properly expand expressions containing curly brackets, which allows remote authenticated users to cause a denial of service (memory consumption) via a crafted FTP STAT command.

See advisories in our WLB2 database:
Topic
Author
Date
High
*bsd libc/glob resource exhaustion (ftpd exploit)
Maksymilian Arci...
04.03.2011
Med.
Multiple FTPD Server GLOB_BRACE|GLOB_LIMIT memory exhaustion
Maksymilian Arci...
02.05.2011
Med.
FreeBSD/GNU ftpd remote denial of service exploit
DevilTeam
31.01.2013
Med.
FreeBSD 9.1 ftpd Remote Denial of Service
Maksymilian Arci...
01.02.2013

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:S/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4/10
2.9/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Pureftpd -> Pure-ftpd 
Netbsd -> Netbsd 

 References:
http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/glob.c.diff?r1=1.27&r2=1.28&f=h
http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/glob.c#rev1.28
https://bugzilla.redhat.com/show_bug.cgi?id=704283
http://www.vupen.com/english/advisories/2011/1273
http://www.securityfocus.com/bid/47671
http://www.pureftpd.org/project/pure-ftpd/news
http://www.mandriva.com/security/advisories?name=MDVSA-2011:094
http://securityreason.com/securityalert/8228
http://securityreason.com/achievement_securityalert/97

Copyright 2022, cxsecurity.com

 

Back to Top