This script is Copyright (C) 2008-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
An updated vsftpd package that fixes a security issue is now
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.
vsftpd (Very Secure File Transfer Protocol (FTP) daemon) is a secure
FTP server for Linux and Unix-like systems.
The version of vsftpd as shipped in Red Hat Enterprise Linux 3 when
used in combination with Pluggable Authentication Modules (PAM) had a
memory leak on an invalid authentication attempt. Since vsftpd prior
to version 2.0.5 allows any number of invalid attempts on the same
connection this memory leak could lead to an eventual DoS.
This update mitigates this security issue by including a backported
patch which terminates a session after a given number of failed log in
attempts. The default number of attempts is 3 and this can be
configured using the 'max_login_fails' directive.
All vsftpd users should upgrade to this updated package, which
addresses this vulnerability.
See also :
Update the affected vsftpd package.
Risk factor :
High / CVSS Base Score : 7.1
Family: Red Hat Local Security Checks
Nessus Plugin ID: 33580 ()
CVE ID: CVE-2008-2375
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.