Vulnerability CVE-2011-0762


Published: 2011-03-02   Modified: 2014-02-20

Description:
The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
vsftpd 2.3.2 remote denial-of-service
Maksymilian Arci...
01.03.2011
Med.
vsftpd 2.3.2 remote dos exploit
Maksymilian Arci...
01.03.2011

Type:

CWE-399

(Resource Management Errors)

Vendor: Beasts
Product: Vsftpd 
Version:
2.3.2
2.3.1
2.3.0
2.2.2
2.2.1
2.2.0
2.1.2
2.1.1
2.1.0
2.0.7
2.0.6
2.0.5
2.0.4
2.0.3
2.0.2
2.0.1
2.0.0
1.2.2
1.2.1
1.2.0
1.1.3
1.1.2
1.1.1
1.1.0
1.0.1
1.0.0
0.9.3
0.9.2
0.9.1
0.9.0
0.0.9
0.0.8
0.0.7
0.0.6
0.0.5
0.0.4
0.0.3
0.0.2
0.0.15
0.0.14
0.0.13
0.0.12
0.0.11
0.0.10
0.0.1

CVSS2 => (AV:N/AC:L/Au:S/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4/10
2.9/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial

 References:
http://www.kb.cert.org/vuls/id/590604
http://xforce.iss.net/xforce/xfdb/65873
http://www.vupen.com/english/advisories/2011/0713
http://www.vupen.com/english/advisories/2011/0668
http://www.vupen.com/english/advisories/2011/0639
http://www.vupen.com/english/advisories/2011/0547
http://www.ubuntu.com/usn/USN-1098-1
http://www.securitytracker.com/id?1025186
http://www.securityfocus.com/bid/46617
http://www.securityfocus.com/archive/1/archive/1/516748/100/0/threaded
http://www.redhat.com/support/errata/RHSA-2011-0337.html
http://www.mandriva.com/security/advisories?name=MDVSA-2011:049
http://www.exploit-db.com/exploits/16270
http://www.debian.org/security/2011/dsa-2305
http://securityreason.com/securityalert/8109
http://securityreason.com/achievement_securityalert/95
http://marc.info/?l=bugtraq&m=133226187115472&w=2
http://marc.info/?l=bugtraq&m=133226187115472&w=2
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055957.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055882.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055881.html
http://cxib.net/stuff/vspoc232.c
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622741
ftp://vsftpd.beasts.org/users/cevans/untar/vsftpd-2.3.4/Changelog

Related CVE
CVE-2015-1419
Unspecified vulnerability in vsftpd 3.0.2 and earlier allows remote attackers to bypass access restrictions via unknown vectors, related to deny_file parsing.
CVE-2004-2259
vsftpd before 1.2.2, when under heavy load, allows attackers to cause a denial of service (crash) via a SIGCHLD signal during a malloc or free call, which is not re-entrant.
CVE-2004-0042
vsftpd 1.1.3 generates different error messages depending on whether or not a valid username exists, which allows remote attackers to identify valid usernames.

Copyright 2017, cxsecurity.com