Mandriva Linux Security Advisory : vsftpd (MDVSA-2011:049)

medium Nessus Plugin ID 52747

Synopsis

The remote Mandriva Linux host is missing a security update.

Description

A vulnerability was discovered and corrected in vsftpd :

The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632 (CVE-2011-0762).

Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149 products_id=490

The updated packages have been patched to correct this issue.

Solution

Update the affected vsftpd package.

Plugin Details

Severity: Medium

ID: 52747

File Name: mandriva_MDVSA-2011-049.nasl

Version: 1.15

Type: local

Published: 3/22/2011

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:vsftpd, cpe:/o:mandriva:linux:2009.0, cpe:/o:mandriva:linux:2010.0, cpe:/o:mandriva:linux:2010.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/21/2011

Reference Information

CVE: CVE-2011-0762

BID: 46617

MDVSA: 2011:049