Vulnerability CVE-2011-1575


Published: 2011-05-23   Modified: 2012-02-13

Description:
The STARTTLS implementation in ftp_parser.c in Pure-FTPd before 1.0.30 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted FTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.

Type:

CWE-399

(Resource Management Errors)

Vendor: Pureftpd
Product: Pure-ftpd 
Version:
1.0.9
1.0.8
1.0.7
1.0.6
1.0.5
1.0.4
1.0.3
1.0.29
1.0.28
1.0.27
1.0.26
1.0.25
1.0.24
1.0.22
1.0.21
1.0.20
1.0.2
1.0.19
1.0.18
1.0.17a
1.0.17
1.0.16c
1.0.16b
1.0.16a
1.0.15
1.0.14
1.0.13a
1.0.12
1.0.11
1.0.10
1.0.1
1.0.0
0.99pre2
0.99pre1
0.99b
0.99a
0.99.9
0.99.4
0.99.3
0.99.2a
0.99.2
0.99.1b
0.99.1a
0.99.1
0.99
0.98pre2
0.98pre1
0.98.7
0.98.6
0.98.5
0.98.4
0.98.3
0.98.2a
0.98.2
0.98.1
0.98-final
0.97pre5
0.97pre4
0.97pre3
0.97pre2
0.97pre1
0.97.7pre3
0.97.7pre2
0.97.7pre1
0.97.7
0.97.6
0.97.5
0.97.4
0.97.3
0.97.2
0.97.1
0.97-final
0.96pre1
0.96.1
0.96
0.95.2
0.95.1
0.95-pre4
0.95-pre3
0.95-pre2
0.95-pre1
0.95
0.94
0.93
0.92
0.91
0.90

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.8/10
4.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
None

 References:
https://github.com/jedisct1/pure-ftpd/commit/65c4d4ad331e94661de763e9b5304d28698999c4
https://bugzilla.novell.com/show_bug.cgi?id=686590
http://archives.pureftpd.org/archives.cgi?100:mss:3910:201103:cpeojfkblajnpinkeadd
https://bugzilla.redhat.com/show_bug.cgi?id=683221
http://www.pureftpd.org/project/pure-ftpd/news
http://secunia.com/advisories/44548
http://secunia.com/advisories/43988
http://openwall.com/lists/oss-security/2011/04/11/8
http://openwall.com/lists/oss-security/2011/04/11/7
http://openwall.com/lists/oss-security/2011/04/11/3
http://openwall.com/lists/oss-security/2011/04/11/14
http://lists.opensuse.org/opensuse-updates/2011-05/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
http://archives.pureftpd.org/archives.cgi?100:mss:3906:201103:cpeojfkblajnpinkeadd

Related CVE
CVE-2017-12170
Downstream version 1.0.46-1 of pure-ftpd as shipped in Fedora was vulnerable to packaging error due to which the original configuration was ignored after update and service started running with default configuration. This has security implications be...
CVE-2011-3171
Directory traversal vulnerability in pure-FTPd 1.0.22 and possibly other versions, when running on SUSE Linux Enterprise Server and possibly other operating systems, when the Netware OES remote server feature is enabled, allows local users to overwri...
CVE-2011-0988
pure-ftpd 1.0.22, as used in SUSE Linux Enterprise Server 10 SP3 and SP4, and Enterprise Desktop 10 SP3 and SP4, when running OES Netware extensions, creates a world-writeable directory, which allows local users to overwrite arbitrary files and gain ...
CVE-2011-0418
The glob implementation in Pure-FTPd before 1.0.32, and in libc in NetBSD 5.1, does not properly expand expressions containing curly brackets, which allows remote authenticated users to cause a denial of service (memory consumption) via a crafted FTP...
CVE-2004-0656
The accept_client function in PureFTPd 1.0.18 and earlier allows remote attackers to cause a denial of service by exceeding the maximum number of connections.

Copyright 2019, cxsecurity.com

 

Back to Top