Vulnerability Name:

CVE-2011-0762 (CCN-65873)

Assigned:2011-03-01
Published:2011-03-01
Updated:2021-03-04
Summary:The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632.
CVSS v3 Severity:3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P)
3.3 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P)
3.3 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (REDHAT CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
4.1 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-400
Vulnerability Consequences:Denial of Service
References:Source: CONFIRM
Type: Broken Link
ftp://vsftpd.beasts.org/users/cevans/untar/vsftpd-2.3.4/Changelog

Source: CONFIRM
Type: Issue Tracking, Third Party Advisory
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622741

Source: MITRE
Type: CNA
CVE-2011-0762

Source: MISC
Type: Broken Link
http://cxib.net/stuff/vspoc232.c

Source: JVN
Type: Third Party Advisory
JVN#37417423

Source: FEDORA
Type: Third Party Advisory
FEDORA-2011-2615

Source: FEDORA
Type: Third Party Advisory
FEDORA-2011-2590

Source: FEDORA
Type: Third Party Advisory
FEDORA-2011-2567

Source: SUSE
Type: Mailing List, Third Party Advisory
SUSE-SR:2011:009

Source: HP
Type: Issue Tracking, Third Party Advisory
HPSBMU02752

Source: CCN
Type: RHSA-2011-0337
Important: vsftpd security update

Source: SREASONRES
Type: Exploit, Third Party Advisory
20110301 vsftpd 2.3.2 remote denial-of-service

Source: SREASON
Type: Exploit, Third Party Advisory
8109

Source: CCN
Type: vsftpd Web page
vsftpd - Secure, fast FTP server for UNIX-like systems

Source: DEBIAN
Type: Third Party Advisory
DSA-2305

Source: DEBIAN
Type: DSA-2305
vsftpd -- denial of service

Source: EXPLOIT-DB
Type: Exploit, Third Party Advisory, VDB Entry
16270

Source: CERT-VN
Type: Broken Link
VU#590604

Source: MANDRIVA
Type: Third Party Advisory
MDVSA-2011:049

Source: REDHAT
Type: Third Party Advisory
RHSA-2011:0337

Source: BUGTRAQ
Type: Third Party Advisory, VDB Entry
20110301 vsftpd 2.3.2 remote denial-of-service

Source: BID
Type: Exploit, Third Party Advisory, VDB Entry
46617

Source: CCN
Type: BID-46617
vsftpd FTP Server 'ls.c' Remote Denial of Service Vulnerability

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1025186

Source: UBUNTU
Type: Third Party Advisory
USN-1098-1

Source: VUPEN
Type: Third Party Advisory
ADV-2011-0547

Source: VUPEN
Type: Third Party Advisory
ADV-2011-0639

Source: VUPEN
Type: Third Party Advisory
ADV-2011-0668

Source: VUPEN
Type: Third Party Advisory
ADV-2011-0713

Source: XF
Type: Third Party Advisory, VDB Entry
vsftpd-vsffilenamepassesfilter-dos(65873)

Source: XF
Type: UNKNOWN
vsftpd-vsffilenamepassesfilter-dos(65873)

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [03-02-2011]

Source: SUSE
Type: SUSE-SR:2011:009
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:vsftpd_project:vsftpd:*:*:*:*:*:*:*:* (Version < 2.3.3)

  • Configuration 2:
  • cpe:/o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:fedoraproject:fedora:13:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:14:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:15:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:7.0:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20110762
    V
    CVE-2011-0762
    2022-05-20
    oval:org.mitre.oval:def:21856
    P
    RHSA-2011:0337: vsftpd security update (Important)
    2015-03-09
    oval:org.mitre.oval:def:13784
    P
    USN-1098-1 -- vsftpd vulnerability
    2014-06-30
    oval:org.mitre.oval:def:15164
    P
    DSA-2305-1 vsftpd -- denial of service
    2014-06-23
    oval:org.mitre.oval:def:23346
    P
    ELSA-2011:0337: vsftpd security update (Important)
    2014-05-26
    oval:com.redhat.rhsa:def:20110337
    P
    RHSA-2011:0337: vsftpd security update (Important)
    2011-03-09
    BACK
    vsftpd_project vsftpd *
    canonical ubuntu linux 6.06
    canonical ubuntu linux 8.04
    canonical ubuntu linux 9.10
    canonical ubuntu linux 10.04
    canonical ubuntu linux 10.10
    fedoraproject fedora 13
    fedoraproject fedora 14
    fedoraproject fedora 15
    debian debian linux 5.0
    debian debian linux 6.0
    debian debian linux 7.0
    opensuse opensuse 11.2
    opensuse opensuse 11.3
    opensuse opensuse 11.4
    suse linux enterprise server 9
    suse linux enterprise server 10 sp3
    suse linux enterprise server 10 sp4
    suse linux enterprise server 11 sp1