ID CVE-2007-5962
Summary Memory leak in a certain Red Hat patch, applied to vsftpd 2.0.5 on Red Hat Enterprise Linux (RHEL) 5 and Fedora 6 through 8, and on Foresight Linux and rPath appliances, allows remote attackers to cause a denial of service (memory consumption) via a large number of CWD commands, as demonstrated by an attack on a daemon with the deny_file configuration option.
References
Vulnerable Configurations
  • cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:fedora:6:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:fedora:6:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:fedora:7:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:fedora:7:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:fedora:8:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:fedora:8:*:*:*:*:*:*:*
  • cpe:2.3:h:foresight_linux:appliances:*:*:*:*:*:*:*:*
    cpe:2.3:h:foresight_linux:appliances:*:*:*:*:*:*:*:*
  • cpe:2.3:h:rpath:appliance_platform_agent:*:*:*:*:*:*:*:*
    cpe:2.3:h:rpath:appliance_platform_agent:*:*:*:*:*:*:*:*
CVSS
Base: 7.1 (as of 15-10-2018 - 21:48)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:C
oval via4
accepted 2013-04-29T04:17:55.546-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 5
    oval oval:org.mitre.oval:def:11414
  • comment The operating system installed on the system is CentOS Linux 5.x
    oval oval:org.mitre.oval:def:15802
  • comment Oracle Linux 5.x
    oval oval:org.mitre.oval:def:15459
description Memory leak in a certain Red Hat patch, applied to vsftpd 2.0.5 on Red Hat Enterprise Linux (RHEL) 5 and Fedora 6 through 8, and on Foresight Linux and rPath appliances, allows remote attackers to cause a denial of service (memory consumption) via a large number of CWD commands, as demonstrated by an attack on a daemon with the deny_file configuration option.
family unix
id oval:org.mitre.oval:def:8850
status accepted
submitted 2010-07-09T03:56:16-04:00
title Memory leak in a certain Red Hat patch, applied to vsftpd 2.0.5 on Red Hat Enterprise Linux (RHEL) 5 and Fedora 6 through 8, and on Foresight Linux and rPath appliances, allows remote attackers to cause a denial of service (memory consumption) via a large number of CWD commands, as demonstrated by an attack on a daemon with the deny_file configuration option.
version 18
redhat via4
advisories
bugzilla
id 400921
title OOPS: reading non-root config file
oval
AND
  • comment Red Hat Enterprise Linux 5 is installed
    oval oval:com.redhat.rhba:tst:20070331001
  • comment vsftpd is earlier than 0:2.0.5-12.el5
    oval oval:com.redhat.rhsa:tst:20080295002
  • comment vsftpd is signed with Red Hat redhatrelease key
    oval oval:com.redhat.rhsa:tst:20080295003
rhsa
id RHSA-2008:0295
released 2008-05-21
severity Low
title RHSA-2008:0295: vsftpd security and bug fix update (Low)
rpms vsftpd-0:2.0.5-12.el5
refmap via4
bid 29322
bugtraq 20080606 rPSA-2008-0185-1 vsftpd
confirm
exploit-db 5814
fedora
  • FEDORA-2008-4347
  • FEDORA-2008-4362
  • FEDORA-2008-4373
mlist
  • [oss-security] 20080521 Re: vsftpd CVE-2007-5962 (Red Hat / Fedora specific)
  • [oss-security] 20080521 vsftpd CVE-2007-5962 (Red Hat / Fedora specific)
sectrack 1020079
secunia
  • 30341
  • 30354
vupen ADV-2008-1600
xf vsftpd-denyfile-dos(42593)
Last major update 15-10-2018 - 21:48
Published 22-05-2008 - 13:09
Back to Top