Vulnerability Name: | CVE-2011-2523 (CCN-68366) | ||||||||||||
Assigned: | 2011-07-04 | ||||||||||||
Published: | 2011-07-04 | ||||||||||||
Updated: | 2021-04-12 | ||||||||||||
Summary: | vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp. | ||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
| ||||||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 7.8 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:UR)
5.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:UR)
| ||||||||||||
Vulnerability Type: | CWE-78 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2011-2523 Source: MISC Type: UNKNOWN http://packetstormsecurity.com/files/162145/vsftpd-2.3.4-Backdoor-Command-Execution.html Source: CCN Type: SA45133 vsftpd Compromised Source Packages Backdoor Security Issue Source: CCN Type: vsftpd Web page vsftpd - Secure, fast FTP server for UNIX-like systems Source: CCN Type: OSVDB ID: 73573 vsftpd on vsftpd.beasts.org Trojaned Distribution Source: CCN Type: BID-48539 vsftpd Compromised Source Packages Backdoor Vulnerability Source: MISC Type: Third Party Advisory https://access.redhat.com/security/cve/cve-2011-2523 Source: XF Type: UNKNOWN vsftpd-package-backdoor(68366) Source: CCN Type: NMAP Web site File ftp-vsftpd-backdoor Source: MISC Type: Exploit, Third Party Advisory, VDB Entry https://packetstormsecurity.com/files/102745/VSFTPD-2.3.4-Backdoor-Command-Execution.html Source: CCN Type: Packet Storm Security [04-12-2021] vsftpd 2.3.4 Backdoor Command Execution Source: MISC Type: Third Party Advisory https://security-tracker.debian.org/tracker/CVE-2011-2523 Source: MISC Type: Third Party Advisory https://vigilance.fr/vulnerability/vsftpd-backdoor-in-version-2-3-4-10805 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [07-05-2011] Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [04-12-2021] Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20110711 Re: vsftpd download backdoored | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |