ID CVE-2011-0762
Summary The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632.
References
Vulnerable Configurations
  • cpe:2.3:a:beasts:vsftpd:0.0.1
    cpe:2.3:a:beasts:vsftpd:0.0.1
  • cpe:2.3:a:beasts:vsftpd:0.0.2
    cpe:2.3:a:beasts:vsftpd:0.0.2
  • cpe:2.3:a:beasts:vsftpd:0.0.3
    cpe:2.3:a:beasts:vsftpd:0.0.3
  • cpe:2.3:a:beasts:vsftpd:0.0.4
    cpe:2.3:a:beasts:vsftpd:0.0.4
  • cpe:2.3:a:beasts:vsftpd:0.0.5
    cpe:2.3:a:beasts:vsftpd:0.0.5
  • cpe:2.3:a:beasts:vsftpd:0.0.6
    cpe:2.3:a:beasts:vsftpd:0.0.6
  • cpe:2.3:a:beasts:vsftpd:0.0.7
    cpe:2.3:a:beasts:vsftpd:0.0.7
  • cpe:2.3:a:beasts:vsftpd:0.0.8
    cpe:2.3:a:beasts:vsftpd:0.0.8
  • cpe:2.3:a:beasts:vsftpd:0.0.9
    cpe:2.3:a:beasts:vsftpd:0.0.9
  • cpe:2.3:a:beasts:vsftpd:0.0.10
    cpe:2.3:a:beasts:vsftpd:0.0.10
  • cpe:2.3:a:beasts:vsftpd:0.0.11
    cpe:2.3:a:beasts:vsftpd:0.0.11
  • cpe:2.3:a:beasts:vsftpd:0.0.12
    cpe:2.3:a:beasts:vsftpd:0.0.12
  • cpe:2.3:a:beasts:vsftpd:0.0.13
    cpe:2.3:a:beasts:vsftpd:0.0.13
  • cpe:2.3:a:beasts:vsftpd:0.0.14
    cpe:2.3:a:beasts:vsftpd:0.0.14
  • cpe:2.3:a:beasts:vsftpd:0.0.15
    cpe:2.3:a:beasts:vsftpd:0.0.15
  • cpe:2.3:a:beasts:vsftpd:0.9.0
    cpe:2.3:a:beasts:vsftpd:0.9.0
  • cpe:2.3:a:beasts:vsftpd:0.9.1
    cpe:2.3:a:beasts:vsftpd:0.9.1
  • cpe:2.3:a:beasts:vsftpd:0.9.2
    cpe:2.3:a:beasts:vsftpd:0.9.2
  • cpe:2.3:a:beasts:vsftpd:0.9.3
    cpe:2.3:a:beasts:vsftpd:0.9.3
  • cpe:2.3:a:beasts:vsftpd:1.0.0
    cpe:2.3:a:beasts:vsftpd:1.0.0
  • cpe:2.3:a:beasts:vsftpd:1.0.1
    cpe:2.3:a:beasts:vsftpd:1.0.1
  • cpe:2.3:a:beasts:vsftpd:1.1.0
    cpe:2.3:a:beasts:vsftpd:1.1.0
  • cpe:2.3:a:beasts:vsftpd:1.1.1
    cpe:2.3:a:beasts:vsftpd:1.1.1
  • cpe:2.3:a:beasts:vsftpd:1.1.2
    cpe:2.3:a:beasts:vsftpd:1.1.2
  • cpe:2.3:a:beasts:vsftpd:1.1.3
    cpe:2.3:a:beasts:vsftpd:1.1.3
  • cpe:2.3:a:beasts:vsftpd:1.2.0
    cpe:2.3:a:beasts:vsftpd:1.2.0
  • cpe:2.3:a:beasts:vsftpd:1.2.1
    cpe:2.3:a:beasts:vsftpd:1.2.1
  • cpe:2.3:a:beasts:vsftpd:1.2.2
    cpe:2.3:a:beasts:vsftpd:1.2.2
  • cpe:2.3:a:beasts:vsftpd:2.0.0
    cpe:2.3:a:beasts:vsftpd:2.0.0
  • cpe:2.3:a:beasts:vsftpd:2.0.1
    cpe:2.3:a:beasts:vsftpd:2.0.1
  • cpe:2.3:a:beasts:vsftpd:2.0.2
    cpe:2.3:a:beasts:vsftpd:2.0.2
  • cpe:2.3:a:beasts:vsftpd:2.0.3
    cpe:2.3:a:beasts:vsftpd:2.0.3
  • cpe:2.3:a:beasts:vsftpd:2.0.4
    cpe:2.3:a:beasts:vsftpd:2.0.4
  • cpe:2.3:a:beasts:vsftpd:2.0.5
    cpe:2.3:a:beasts:vsftpd:2.0.5
  • cpe:2.3:a:beasts:vsftpd:2.0.6
    cpe:2.3:a:beasts:vsftpd:2.0.6
  • cpe:2.3:a:beasts:vsftpd:2.0.7
    cpe:2.3:a:beasts:vsftpd:2.0.7
  • cpe:2.3:a:beasts:vsftpd:2.1.0
    cpe:2.3:a:beasts:vsftpd:2.1.0
  • cpe:2.3:a:beasts:vsftpd:2.1.1
    cpe:2.3:a:beasts:vsftpd:2.1.1
  • cpe:2.3:a:beasts:vsftpd:2.1.2
    cpe:2.3:a:beasts:vsftpd:2.1.2
  • cpe:2.3:a:beasts:vsftpd:2.2.0
    cpe:2.3:a:beasts:vsftpd:2.2.0
  • cpe:2.3:a:beasts:vsftpd:2.2.1
    cpe:2.3:a:beasts:vsftpd:2.2.1
  • cpe:2.3:a:beasts:vsftpd:2.2.2
    cpe:2.3:a:beasts:vsftpd:2.2.2
  • cpe:2.3:a:beasts:vsftpd:2.3.0
    cpe:2.3:a:beasts:vsftpd:2.3.0
  • cpe:2.3:a:beasts:vsftpd:2.3.1
    cpe:2.3:a:beasts:vsftpd:2.3.1
  • cpe:2.3:a:beasts:vsftpd:2.3.2
    cpe:2.3:a:beasts:vsftpd:2.3.2
CVSS
Base: 4.0 (as of 03-03-2011 - 11:45)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE_INSTANCE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
exploit-db via4
description vsftpd 2.3.2 - Denial of Service Vulnerability. CVE-2011-0762. Dos exploit for linux platform
file exploits/linux/dos/16270.c
id EDB-ID:16270
last seen 2016-02-01
modified 2011-03-02
platform linux
port
published 2011-03-02
reporter Maksymilian Arciemowicz
source https://www.exploit-db.com/download/16270/
title vsftpd 2.3.2 - Denial of Service Vulnerability
type dos
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id SUSE_VSFTPD-7408.NASL
    description Certain file patterns could cause vsftpd to consume excessive CPU resulting in denial of service (CVE-2011-0762). This has been fixed.
    last seen 2019-02-21
    modified 2012-05-17
    plugin id 57260
    published 2011-12-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57260
    title SuSE 10 Security Update : vsftpd (ZYPP Patch Number 7408)
  • NASL family FTP
    NASL id VSFTPD_2_3_3.NASL
    description According to its self-reported version number, the instance of vsftpd listening on the remote server is earlier than 2.3.3 and, as such, may be affected by a denial of service vulnerability. An error exists in the function 'vsf_filename_passes_filter()' in 'ls.c' that allows resource intensive glob expressions to be processed with the 'STAT' command. Using numerous IP addresses to bypass an FTP-sessions-per-IP-address limit, a remote attacker can carry out a denial of service attack. Note that Nessus did not actually test for the flaw but instead has relied on the version in vsftpd's banner.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 52704
    published 2011-03-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52704
    title vsftpd vsf_filename_passes_filter Function Denial of Service
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2011-0337.NASL
    description An updated vsftpd package that fixes one security issue is now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. vsftpd (Very Secure File Transfer Protocol (FTP) daemon) is a secure FTP server for Linux, UNIX, and similar operating systems. A flaw was discovered in the way vsftpd processed file name patterns. An FTP user could use this flaw to cause the vsftpd process to use an excessive amount of CPU time, when processing a request with a specially crafted file name pattern. (CVE-2011-0762) All vsftpd users should upgrade to this updated package, which contains a backported patch to correct this issue. The vsftpd daemon must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 52608
    published 2011-03-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52608
    title RHEL 4 / 5 / 6 : vsftpd (RHSA-2011:0337)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_2_VSFTPD-110308.NASL
    description Certain file patterns could cause vsftpd to consume excessive CPU resulting in denial of service (CVE-2011-0762).
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 53825
    published 2011-05-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53825
    title openSUSE Security Update : vsftpd (openSUSE-SU-2011:0435-1)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2305.NASL
    description Two security issue have been discovered that affect vsftpd, a lightweight, efficient FTP server written for security. - CVE-2011-2189 It was discovered that Linux kernels < 2.6.35 are considerably slower in releasing than in the creation of network namespaces. As a result of this and because vsftpd is using this feature as a security enhancement to provide network isolation for connections, it is possible to cause denial of service conditions due to excessive memory allocations by the kernel. This is technically no vsftpd flaw, but a kernel issue. However, this feature has legitimate use cases and backporting the specific kernel patch is too intrusive. Additionally, a local attacker requires the CAP_SYS_ADMIN capability to abuse this functionality. Therefore, as a fix, a kernel version check has been added to vsftpd in order to disable this feature for kernels < 2.6.35. - CVE-2011-0762 Maksymilian Arciemowicz discovered that vsftpd is incorrectly handling certain glob expressions in STAT commands. This allows a remote authenticated attacker to conduct denial of service attacks (excessive CPU and process slot exhaustion) via crafted STAT commands.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 56231
    published 2011-09-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=56231
    title Debian DSA-2305-1 : vsftpd - denial of service
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-2615.NASL
    description - Thu Mar 3 2011 Jiri Skala - 2.3.4-1 - update to latest upstream 2.3.4 - fixes #681935 - CVE-2011-0762 vsftpd: remote DoS via crafted glob pattern - Mon May 17 2010 Jiri Skala - 2.2.2-7 - when listen_ipv6=YES sets socket option to listen IPv6 only - Fri May 14 2010 Jiri Skala - 2.2.2-6 - syscall(__NR_clone) replaced by clone() to fix incorrect order of params on s390 arch - Wed Apr 7 2010 Jiri Skala - 2.2.2-5 - corrected daemonize_plus patch - don't try kill parent when vsftpd isn't daemonized - Tue Mar 16 2010 Jiri Skala - 2.2.2-4 - fixes #544251 - /etc/rc.d/init.d/vsftpd does not start more than one daemon Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 52663
    published 2011-03-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52663
    title Fedora 13 : vsftpd-2.3.4-1.fc13 (2011-2615)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-2590.NASL
    description - Thu Mar 3 2011 Jiri Skala - 2.3.4-1 - update to latest upstream 2.3.4 - fixes #681935 - CVE-2011-0762 vsftpd: remote DoS via crafted glob pattern Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 52662
    published 2011-03-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52662
    title Fedora 14 : vsftpd-2.3.4-1.fc14 (2011-2590)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-1098-1.NASL
    description It was discovered that vsftpd incorrectly handled certain glob expressions. A remote authenticated user could use a crafted glob expression to cause vftpd to consume all resources, leading to a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 53222
    published 2011-03-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53222
    title Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : vsftpd vulnerability (USN-1098-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE9_12690.NASL
    description Certain file patterns could cause vsftpd to consume excessive CPU resulting in denial of service (CVE-2011-0762). This has been fixed.
    last seen 2019-02-21
    modified 2012-04-23
    plugin id 53823
    published 2011-05-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53823
    title SuSE9 Security Update : vsftpd (YOU Patch Number 12690)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_4_VSFTPD-110308.NASL
    description Certain file patterns could cause vsftpd to consume excessive CPU resulting in denial of service (CVE-2011-0762).
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 76042
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=76042
    title openSUSE Security Update : vsftpd (openSUSE-SU-2011:0435-1)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-2567.NASL
    description - Bug #681667 - CVE-2011-0762 vsftpd: remote DoS via crafted glob pattern Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 52675
    published 2011-03-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52675
    title Fedora 15 : vsftpd-2.3.4-1.fc15 (2011-2567)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201110-07.NASL
    description The remote host is affected by the vulnerability described in GLSA-201110-07 (vsftpd: Denial of Service) A Denial of Service vulnerability was discovered in vsftpd. Please review the CVE identifier referenced below for details. Impact : A remote authenticated attacker could cause a Denial of Service. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2015-04-13
    plugin id 56460
    published 2011-10-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=56460
    title GLSA-201110-07 : vsftpd: Denial of Service
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_VSFTPD-110308.NASL
    description Certain file patterns could cause vsftpd to consume excessive CPU resulting in denial of service (CVE-2011-0762). This has been fixed.
    last seen 2019-02-21
    modified 2013-10-25
    plugin id 53827
    published 2011-05-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53827
    title SuSE 11.1 Security Update : vsftpd (SAT Patch Number 4114)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20110309_VSFTPD_ON_SL4_X.NASL
    description A flaw was discovered in the way vsftpd processed file name patterns. An FTP user could use this flaw to cause the vsftpd process to use an excessive amount of CPU time, when processing a request with a specially crafted file name pattern. (CVE-2011-0762) The vsftpd daemon must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 60986
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=60986
    title Scientific Linux Security Update : vsftpd on SL4.x, SL5.x, SL6.x i386/x86_64
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2011-0337.NASL
    description From Red Hat Security Advisory 2011:0337 : An updated vsftpd package that fixes one security issue is now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. vsftpd (Very Secure File Transfer Protocol (FTP) daemon) is a secure FTP server for Linux, UNIX, and similar operating systems. A flaw was discovered in the way vsftpd processed file name patterns. An FTP user could use this flaw to cause the vsftpd process to use an excessive amount of CPU time, when processing a request with a specially crafted file name pattern. (CVE-2011-0762) All vsftpd users should upgrade to this updated package, which contains a backported patch to correct this issue. The vsftpd daemon must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68226
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68226
    title Oracle Linux 4 / 5 / 6 : vsftpd (ELSA-2011-0337)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_3_VSFTPD-110308.NASL
    description Certain file patterns could cause vsftpd to consume excessive CPU resulting in denial of service (CVE-2011-0762).
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 75769
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75769
    title openSUSE Security Update : vsftpd (openSUSE-SU-2011:0435-1)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2011-0337.NASL
    description An updated vsftpd package that fixes one security issue is now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. vsftpd (Very Secure File Transfer Protocol (FTP) daemon) is a secure FTP server for Linux, UNIX, and similar operating systems. A flaw was discovered in the way vsftpd processed file name patterns. An FTP user could use this flaw to cause the vsftpd process to use an excessive amount of CPU time, when processing a request with a specially crafted file name pattern. (CVE-2011-0762) All vsftpd users should upgrade to this updated package, which contains a backported patch to correct this issue. The vsftpd daemon must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 52617
    published 2011-03-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52617
    title CentOS 4 / 5 : vsftpd (CESA-2011:0337)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2011-049.NASL
    description A vulnerability was discovered and corrected in vsftpd : The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632 (CVE-2011-0762). Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149 products_id=490 The updated packages have been patched to correct this issue.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 52747
    published 2011-03-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52747
    title Mandriva Linux Security Advisory : vsftpd (MDVSA-2011:049)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_VSFTPD-7373.NASL
    description Certain file patterns could cause vsftpd to consume excessive CPU resulting in denial of service (CVE-2011-0762). This has been fixed.
    last seen 2019-02-21
    modified 2012-05-17
    plugin id 53828
    published 2011-05-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53828
    title SuSE 10 Security Update : vsftpd (ZYPP Patch Number 7373)
packetstorm via4
data source https://packetstormsecurity.com/files/download/98796/vsftpd232-dos.txt
id PACKETSTORM:98796
last seen 2016-12-05
published 2011-03-01
reporter Maksymilian Arciemowicz
source https://packetstormsecurity.com/files/98796/Vsftpd-2.3.2-Denial-Of-Service.html
title Vsftpd 2.3.2 Denial Of Service
redhat via4
advisories
bugzilla
id 681667
title CVE-2011-0762 vsftpd: remote DoS via crafted glob pattern
oval
OR
  • AND
    • comment Red Hat Enterprise Linux 4 is installed
      oval oval:com.redhat.rhsa:tst:20060016001
    • comment vsftpd is earlier than 0:2.0.1-9.el4
      oval oval:com.redhat.rhsa:tst:20110337002
    • comment vsftpd is signed with Red Hat master key
      oval oval:com.redhat.rhsa:tst:20080579003
  • AND
    • comment vsftpd is earlier than 0:2.2.2-6.el6_0.1
      oval oval:com.redhat.rhsa:tst:20110337008
    • comment vsftpd is signed with Red Hat redhatrelease2 key
      oval oval:com.redhat.rhsa:tst:20110337009
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhsa:tst:20100842001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhsa:tst:20100842002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20100842003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20100842004
  • AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhsa:tst:20070055001
    • comment vsftpd is earlier than 0:2.0.5-16.el5_6.1
      oval oval:com.redhat.rhsa:tst:20110337011
    • comment vsftpd is signed with Red Hat redhatrelease key
      oval oval:com.redhat.rhsa:tst:20080295003
rhsa
id RHSA-2011:0337
released 2011-03-09
severity Important
title RHSA-2011:0337: vsftpd security update (Important)
rpms
  • vsftpd-0:2.0.1-9.el4
  • vsftpd-0:2.2.2-6.el6_0.1
  • vsftpd-0:2.0.5-16.el5_6.1
refmap via4
bid 46617
bugtraq 20110301 vsftpd 2.3.2 remote denial-of-service
cert-vn VU#590604
confirm
debian DSA-2305
exploit-db 16270
fedora
  • FEDORA-2011-2567
  • FEDORA-2011-2590
  • FEDORA-2011-2615
hp
  • HPSBMU02752
  • SSRT100802
mandriva MDVSA-2011:049
misc http://cxib.net/stuff/vspoc232.c
sectrack 1025186
sreason 8109
sreasonres 20110301 vsftpd 2.3.2 remote denial-of-service
suse SUSE-SR:2011:009
ubuntu USN-1098-1
vupen
  • ADV-2011-0547
  • ADV-2011-0639
  • ADV-2011-0668
  • ADV-2011-0713
xf vsftpd-vsffilenamepassesfilter-dos(65873)
Last major update 20-02-2014 - 23:40
Published 02-03-2011 - 15:00
Last modified 09-10-2018 - 15:29
Back to Top