![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.70399 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-2305-1) |
Summary: | The remote host is missing an update for the Debian 'vsftpd' package(s) announced via the DSA-2305-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'vsftpd' package(s) announced via the DSA-2305-1 advisory. Vulnerability Insight: Two security issue have been discovered that affect vsftpd, a lightweight, efficient FTP server written for security. CVE-2011-2189 It was discovered that Linux kernels < 2.6.35 are considerably slower in releasing than in the creation of network namespaces. As a result of this and because vsftpd is using this feature as a security enhancement to provide network isolation for connections, it is possible to cause denial of service conditions due to excessive memory allocations by the kernel. This is technically no vsftpd flaw, but a kernel issue. However, this feature has legitimate use cases and backporting the specific kernel patch is too intrusive. Additionally, a local attacker requires the CAP_SYS_ADMIN capability to abuse this functionality. Therefore, as a fix, a kernel version check has been added to vsftpd in order to disable this feature for kernels < 2.6.35. CVE-2011-0762 Maksymilian Arciemowicz discovered that vsftpd is incorrectly handling certain glob expressions in STAT commands. This allows a remote authenticated attacker to conduct denial of service attacks (excessive CPU and process slot exhaustion) via crafted STAT commands. For the oldstable distribution (lenny), this problem has been fixed in version 2.0.7-1+lenny1. For the stable distribution (squeeze), this problem has been fixed in version 2.3.2-3+squeeze2. Please note that CVE-2011-2189 does not affect the lenny version. For the testing distribution (wheezy), this problem will be fixed soon. For the unstable distribution (sid), this problem has been fixed in version 2.3.4-1. We recommend that you upgrade your vsftpd packages. Affected Software/OS: 'vsftpd' package(s) on Debian 5, Debian 6. Solution: Please install the updated package(s). CVSS Score: 4.0 CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-0762 BugTraq ID: 46617 http://www.securityfocus.com/bid/46617 Bugtraq: 20110301 vsftpd 2.3.2 remote denial-of-service (Google Search) http://www.securityfocus.com/archive/1/516748/100/0/threaded CERT/CC vulnerability note: VU#590604 http://www.kb.cert.org/vuls/id/590604 Debian Security Information: DSA-2305 (Google Search) http://www.debian.org/security/2011/dsa-2305 http://www.exploit-db.com/exploits/16270 http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055957.html http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055882.html http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055881.html HPdes Security Advisory: HPSBMU02752 http://marc.info/?l=bugtraq&m=133226187115472&w=2 HPdes Security Advisory: SSRT100802 http://jvn.jp/en/jp/JVN37417423/index.html http://www.mandriva.com/security/advisories?name=MDVSA-2011:049 http://cxib.net/stuff/vspoc232.c http://www.redhat.com/support/errata/RHSA-2011-0337.html http://www.securitytracker.com/id?1025186 http://securityreason.com/securityalert/8109 http://securityreason.com/achievement_securityalert/95 SuSE Security Announcement: SUSE-SR:2011:009 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html http://www.ubuntu.com/usn/USN-1098-1 http://www.vupen.com/english/advisories/2011/0547 http://www.vupen.com/english/advisories/2011/0639 http://www.vupen.com/english/advisories/2011/0668 http://www.vupen.com/english/advisories/2011/0713 XForce ISS Database: vsftpd-vsffilenamepassesfilter-dos(65873) https://exchange.xforce.ibmcloud.com/vulnerabilities/65873 |
Copyright | Copyright (C) 2011 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |