CVE-2011-0762

CVSS V2 Medium 4 CVSS V3 None
Description
The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632.
Overview
  • CVE ID
  • CVE-2011-0762
  • Assigner
  • cret@cert.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2011-03-02T20:00:01
  • Last Modified Date
  • 2021-03-04T20:13:20
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:vsftpd_project:vsftpd:*:*:*:*:*:*:*:* 1 OR 2.3.3
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:S/C:N/I:N/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • SINGLE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 4
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8
  • Impact Score
  • 2.9
References
Reference URL Reference Tags
http://securityreason.com/achievement_securityalert/95 Exploit Third Party Advisory
http://cxib.net/stuff/vspoc232.c Broken Link
ftp://vsftpd.beasts.org/users/cevans/untar/vsftpd-2.3.4/Changelog Broken Link
http://www.securityfocus.com/bid/46617 Exploit Third Party Advisory VDB Entry
http://www.kb.cert.org/vuls/id/590604 Broken Link
http://www.vupen.com/english/advisories/2011/0547 Third Party Advisory
http://www.exploit-db.com/exploits/16270 Exploit Third Party Advisory VDB Entry
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055881.html Third Party Advisory
http://www.vupen.com/english/advisories/2011/0639 Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-0337.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055882.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055957.html Third Party Advisory
http://www.vupen.com/english/advisories/2011/0668 Third Party Advisory
http://www.securitytracker.com/id?1025186 Third Party Advisory VDB Entry
http://www.mandriva.com/security/advisories?name=MDVSA-2011:049 Third Party Advisory
http://www.vupen.com/english/advisories/2011/0713 Third Party Advisory
http://www.ubuntu.com/usn/USN-1098-1 Third Party Advisory
http://securityreason.com/securityalert/8109 Exploit Third Party Advisory
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622741 Issue Tracking Third Party Advisory
http://www.debian.org/security/2011/dsa-2305 Third Party Advisory
http://marc.info/?l=bugtraq&m=133226187115472&w=2 Issue Tracking Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html Mailing List Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/65873 Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/516748/100/0/threaded Third Party Advisory VDB Entry
http://jvn.jp/en/jp/JVN37417423/index.html Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 07:21:02 Added to TrackCVE