Fedora 14 : pure-ftpd-1.0.30-1.fc14 (2011-3349)

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing a security update.

Description :

Wietse Venema and Victor Duchovni discovered and reported an issue
that could lead to a potential information disclosure.

An unencrypted FTP command immediately following STARTTLS request
would get buffered and processed prior to SSL/TLS handshake, resulting
in potential authentication bypass in case a client certificate
authentication was configured to provide user identity.

A report of similar issue that was originally discovered in Postfix
MTA contains further technical details and discusses possible impact:
http://www.postfix.org/CVE-2011-0411.html

Users of pure-ftpd are advised to install this updated package which
contains a fix for the issue.

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.postfix.org/CVE-2011-0411.html
https://bugzilla.redhat.com/show_bug.cgi?id=683221
http://www.nessus.org/u?1de2f670

Solution :

Update the affected pure-ftpd package.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Fedora Local Security Checks

Nessus Plugin ID: 53240 ()

Bugtraq ID: 46767

CVE ID:

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial