rhsa-2008_0295
Vulnerability from csaf_redhat
Published
2008-05-21 14:16
Modified
2024-11-22 01:41
Summary
Red Hat Security Advisory: vsftpd security and bug fix update
Notes
Topic
An updated vsftpd package that fixes a security issue and several bugs is
now available for Red Hat Enterprise Linux 5.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
The vsftpd package includes a Very Secure File Transfer Protocol (FTP)
daemon.
A memory leak was discovered in the vsftpd daemon. An attacker who is able
to connect to an FTP service, either as an authenticated or anonymous user,
could cause vsftpd to allocate all available memory if the "deny_file"
option was enabled in vsftpd.conf. (CVE-2007-5962)
As well, this updated package fixes following bugs:
* a race condition could occur even when the "lock_upload_files" option is
set. When uploading two files simultaneously, the result was a combination
of the two files. This resulted in uploaded files becoming corrupted. In
these updated packages, uploading two files simultaneously will result in a
file that is identical to the last uploaded file.
* when the "userlist_enable" option is used, failed log in attempts as a
result of the user not being in the list of allowed users, or being in the
list of denied users, will not be logged. In these updated packages, a new
"userlist_log=YES" option can be configured in vsftpd.conf, which will log
failed log in attempts in these situations.
* vsftpd did not support usernames that started with an underscore or a
period character. Usernames starting with an underscore or a period are
supported in these updated packages.
* using wildcards in conjunction with the "ls" command did not return all
the file names it should. For example, if you FTPed into a directory
containing three files -- A1, A21 and A11 -- and ran the "ls *1" command,
only the file names A1 and A21 were returned. These updated packages use
greedier code that continues to speculatively scan for items even after
matches have been found.
* when the "user_config_dir" option is enabled in vsftpd.conf, and the
user-specific configuration file did not exist, the following error
occurred after a user entered their password during the log in process:
500 OOPS: reading non-root config file
This has been resolved in this updated package.
All vsftpd users are advised to upgrade to this updated package, which
resolves these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated vsftpd package that fixes a security issue and several bugs is\nnow available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "The vsftpd package includes a Very Secure File Transfer Protocol (FTP)\ndaemon.\n\nA memory leak was discovered in the vsftpd daemon. An attacker who is able\nto connect to an FTP service, either as an authenticated or anonymous user,\ncould cause vsftpd to allocate all available memory if the \"deny_file\"\noption was enabled in vsftpd.conf. (CVE-2007-5962)\n\nAs well, this updated package fixes following bugs:\n\n* a race condition could occur even when the \"lock_upload_files\" option is\nset. When uploading two files simultaneously, the result was a combination\nof the two files. This resulted in uploaded files becoming corrupted. In\nthese updated packages, uploading two files simultaneously will result in a\nfile that is identical to the last uploaded file.\n\n* when the \"userlist_enable\" option is used, failed log in attempts as a\nresult of the user not being in the list of allowed users, or being in the\nlist of denied users, will not be logged. In these updated packages, a new\n\"userlist_log=YES\" option can be configured in vsftpd.conf, which will log\nfailed log in attempts in these situations.\n\n* vsftpd did not support usernames that started with an underscore or a\nperiod character. Usernames starting with an underscore or a period are\nsupported in these updated packages.\n\n* using wildcards in conjunction with the \"ls\" command did not return all\nthe file names it should. For example, if you FTPed into a directory\ncontaining three files -- A1, A21 and A11 -- and ran the \"ls *1\" command,\nonly the file names A1 and A21 were returned. These updated packages use\ngreedier code that continues to speculatively scan for items even after\nmatches have been found.\n\n* when the \"user_config_dir\" option is enabled in vsftpd.conf, and the\nuser-specific configuration file did not exist, the following error\noccurred after a user entered their password during the log in process:\n\n500 OOPS: reading non-root config file\n\nThis has been resolved in this updated package.\n\nAll vsftpd users are advised to upgrade to this updated package, which\nresolves these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0295", "url": "https://access.redhat.com/errata/RHSA-2008:0295" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "240553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240553" }, { "category": "external", "summary": "392181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=392181" }, { "category": "external", "summary": "392231", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=392231" }, { "category": "external", "summary": "397011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=397011" }, { "category": "external", "summary": "400921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=400921" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0295.json" } ], "title": "Red Hat Security Advisory: vsftpd security and bug fix update", "tracking": { "current_release_date": "2024-11-22T01:41:38+00:00", "generator": { "date": "2024-11-22T01:41:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0295", "initial_release_date": "2008-05-21T14:16:00+00:00", "revision_history": [ { "date": "2008-05-21T14:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-05-21T10:16:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:41:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "vsftpd-0:2.0.5-12.el5.src", "product": { "name": "vsftpd-0:2.0.5-12.el5.src", "product_id": "vsftpd-0:2.0.5-12.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/vsftpd@2.0.5-12.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "vsftpd-0:2.0.5-12.el5.x86_64", "product": { "name": "vsftpd-0:2.0.5-12.el5.x86_64", "product_id": "vsftpd-0:2.0.5-12.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vsftpd@2.0.5-12.el5?arch=x86_64" } } }, { "category": "product_version", "name": "vsftpd-debuginfo-0:2.0.5-12.el5.x86_64", "product": { "name": "vsftpd-debuginfo-0:2.0.5-12.el5.x86_64", "product_id": "vsftpd-debuginfo-0:2.0.5-12.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vsftpd-debuginfo@2.0.5-12.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "vsftpd-0:2.0.5-12.el5.i386", "product": { "name": "vsftpd-0:2.0.5-12.el5.i386", "product_id": "vsftpd-0:2.0.5-12.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/vsftpd@2.0.5-12.el5?arch=i386" } } }, { "category": "product_version", "name": "vsftpd-debuginfo-0:2.0.5-12.el5.i386", "product": { "name": "vsftpd-debuginfo-0:2.0.5-12.el5.i386", "product_id": "vsftpd-debuginfo-0:2.0.5-12.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/vsftpd-debuginfo@2.0.5-12.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "vsftpd-0:2.0.5-12.el5.ia64", "product": { "name": "vsftpd-0:2.0.5-12.el5.ia64", "product_id": "vsftpd-0:2.0.5-12.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vsftpd@2.0.5-12.el5?arch=ia64" } } }, { "category": "product_version", "name": "vsftpd-debuginfo-0:2.0.5-12.el5.ia64", "product": { "name": "vsftpd-debuginfo-0:2.0.5-12.el5.ia64", "product_id": "vsftpd-debuginfo-0:2.0.5-12.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/vsftpd-debuginfo@2.0.5-12.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "vsftpd-0:2.0.5-12.el5.ppc", "product": { "name": "vsftpd-0:2.0.5-12.el5.ppc", "product_id": "vsftpd-0:2.0.5-12.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/vsftpd@2.0.5-12.el5?arch=ppc" } } }, { "category": "product_version", "name": "vsftpd-debuginfo-0:2.0.5-12.el5.ppc", "product": { "name": "vsftpd-debuginfo-0:2.0.5-12.el5.ppc", "product_id": "vsftpd-debuginfo-0:2.0.5-12.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/vsftpd-debuginfo@2.0.5-12.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "vsftpd-0:2.0.5-12.el5.s390x", "product": { "name": "vsftpd-0:2.0.5-12.el5.s390x", "product_id": "vsftpd-0:2.0.5-12.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/vsftpd@2.0.5-12.el5?arch=s390x" } } }, { "category": "product_version", "name": "vsftpd-debuginfo-0:2.0.5-12.el5.s390x", "product": { "name": "vsftpd-debuginfo-0:2.0.5-12.el5.s390x", "product_id": "vsftpd-debuginfo-0:2.0.5-12.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/vsftpd-debuginfo@2.0.5-12.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "vsftpd-0:2.0.5-12.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:vsftpd-0:2.0.5-12.el5.i386" }, "product_reference": "vsftpd-0:2.0.5-12.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-0:2.0.5-12.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:vsftpd-0:2.0.5-12.el5.ia64" }, "product_reference": "vsftpd-0:2.0.5-12.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-0:2.0.5-12.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:vsftpd-0:2.0.5-12.el5.ppc" }, "product_reference": "vsftpd-0:2.0.5-12.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-0:2.0.5-12.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:vsftpd-0:2.0.5-12.el5.s390x" }, "product_reference": "vsftpd-0:2.0.5-12.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-0:2.0.5-12.el5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:vsftpd-0:2.0.5-12.el5.src" }, "product_reference": "vsftpd-0:2.0.5-12.el5.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-0:2.0.5-12.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:vsftpd-0:2.0.5-12.el5.x86_64" }, "product_reference": "vsftpd-0:2.0.5-12.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-debuginfo-0:2.0.5-12.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:vsftpd-debuginfo-0:2.0.5-12.el5.i386" }, "product_reference": "vsftpd-debuginfo-0:2.0.5-12.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-debuginfo-0:2.0.5-12.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:vsftpd-debuginfo-0:2.0.5-12.el5.ia64" }, "product_reference": "vsftpd-debuginfo-0:2.0.5-12.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-debuginfo-0:2.0.5-12.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:vsftpd-debuginfo-0:2.0.5-12.el5.ppc" }, "product_reference": "vsftpd-debuginfo-0:2.0.5-12.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-debuginfo-0:2.0.5-12.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:vsftpd-debuginfo-0:2.0.5-12.el5.s390x" }, "product_reference": "vsftpd-debuginfo-0:2.0.5-12.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-debuginfo-0:2.0.5-12.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:vsftpd-debuginfo-0:2.0.5-12.el5.x86_64" }, "product_reference": "vsftpd-debuginfo-0:2.0.5-12.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-0:2.0.5-12.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:vsftpd-0:2.0.5-12.el5.i386" }, "product_reference": "vsftpd-0:2.0.5-12.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-0:2.0.5-12.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:vsftpd-0:2.0.5-12.el5.ia64" }, "product_reference": "vsftpd-0:2.0.5-12.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-0:2.0.5-12.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:vsftpd-0:2.0.5-12.el5.ppc" }, "product_reference": "vsftpd-0:2.0.5-12.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-0:2.0.5-12.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:vsftpd-0:2.0.5-12.el5.s390x" }, "product_reference": "vsftpd-0:2.0.5-12.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-0:2.0.5-12.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:vsftpd-0:2.0.5-12.el5.src" }, "product_reference": "vsftpd-0:2.0.5-12.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-0:2.0.5-12.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:vsftpd-0:2.0.5-12.el5.x86_64" }, "product_reference": "vsftpd-0:2.0.5-12.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-debuginfo-0:2.0.5-12.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:vsftpd-debuginfo-0:2.0.5-12.el5.i386" }, "product_reference": "vsftpd-debuginfo-0:2.0.5-12.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-debuginfo-0:2.0.5-12.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:vsftpd-debuginfo-0:2.0.5-12.el5.ia64" }, "product_reference": "vsftpd-debuginfo-0:2.0.5-12.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-debuginfo-0:2.0.5-12.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:vsftpd-debuginfo-0:2.0.5-12.el5.ppc" }, "product_reference": "vsftpd-debuginfo-0:2.0.5-12.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-debuginfo-0:2.0.5-12.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:vsftpd-debuginfo-0:2.0.5-12.el5.s390x" }, "product_reference": "vsftpd-debuginfo-0:2.0.5-12.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "vsftpd-debuginfo-0:2.0.5-12.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:vsftpd-debuginfo-0:2.0.5-12.el5.x86_64" }, "product_reference": "vsftpd-debuginfo-0:2.0.5-12.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-5962", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2007-11-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "397011" } ], "notes": [ { "category": "description", "text": "Memory leak in a certain Red Hat patch, applied to vsftpd 2.0.5 on Red Hat Enterprise Linux (RHEL) 5 and Fedora 6 through 8, and on Foresight Linux and rPath appliances, allows remote attackers to cause a denial of service (memory consumption) via a large number of CWD commands, as demonstrated by an attack on a daemon with the deny_file configuration option.", "title": "Vulnerability description" }, { "category": "summary", "text": "vsftpd: memory leak when deny_file option is set", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:vsftpd-0:2.0.5-12.el5.i386", "5Client-Workstation:vsftpd-0:2.0.5-12.el5.ia64", "5Client-Workstation:vsftpd-0:2.0.5-12.el5.ppc", "5Client-Workstation:vsftpd-0:2.0.5-12.el5.s390x", "5Client-Workstation:vsftpd-0:2.0.5-12.el5.src", "5Client-Workstation:vsftpd-0:2.0.5-12.el5.x86_64", "5Client-Workstation:vsftpd-debuginfo-0:2.0.5-12.el5.i386", "5Client-Workstation:vsftpd-debuginfo-0:2.0.5-12.el5.ia64", "5Client-Workstation:vsftpd-debuginfo-0:2.0.5-12.el5.ppc", "5Client-Workstation:vsftpd-debuginfo-0:2.0.5-12.el5.s390x", "5Client-Workstation:vsftpd-debuginfo-0:2.0.5-12.el5.x86_64", "5Server:vsftpd-0:2.0.5-12.el5.i386", "5Server:vsftpd-0:2.0.5-12.el5.ia64", "5Server:vsftpd-0:2.0.5-12.el5.ppc", "5Server:vsftpd-0:2.0.5-12.el5.s390x", "5Server:vsftpd-0:2.0.5-12.el5.src", "5Server:vsftpd-0:2.0.5-12.el5.x86_64", "5Server:vsftpd-debuginfo-0:2.0.5-12.el5.i386", "5Server:vsftpd-debuginfo-0:2.0.5-12.el5.ia64", "5Server:vsftpd-debuginfo-0:2.0.5-12.el5.ppc", "5Server:vsftpd-debuginfo-0:2.0.5-12.el5.s390x", "5Server:vsftpd-debuginfo-0:2.0.5-12.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5962" }, { "category": "external", "summary": "RHBZ#397011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=397011" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5962", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5962" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5962", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5962" } ], "release_date": "2008-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-21T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client-Workstation:vsftpd-0:2.0.5-12.el5.i386", "5Client-Workstation:vsftpd-0:2.0.5-12.el5.ia64", "5Client-Workstation:vsftpd-0:2.0.5-12.el5.ppc", "5Client-Workstation:vsftpd-0:2.0.5-12.el5.s390x", "5Client-Workstation:vsftpd-0:2.0.5-12.el5.src", "5Client-Workstation:vsftpd-0:2.0.5-12.el5.x86_64", "5Client-Workstation:vsftpd-debuginfo-0:2.0.5-12.el5.i386", "5Client-Workstation:vsftpd-debuginfo-0:2.0.5-12.el5.ia64", "5Client-Workstation:vsftpd-debuginfo-0:2.0.5-12.el5.ppc", "5Client-Workstation:vsftpd-debuginfo-0:2.0.5-12.el5.s390x", "5Client-Workstation:vsftpd-debuginfo-0:2.0.5-12.el5.x86_64", "5Server:vsftpd-0:2.0.5-12.el5.i386", "5Server:vsftpd-0:2.0.5-12.el5.ia64", "5Server:vsftpd-0:2.0.5-12.el5.ppc", "5Server:vsftpd-0:2.0.5-12.el5.s390x", "5Server:vsftpd-0:2.0.5-12.el5.src", "5Server:vsftpd-0:2.0.5-12.el5.x86_64", "5Server:vsftpd-debuginfo-0:2.0.5-12.el5.i386", "5Server:vsftpd-debuginfo-0:2.0.5-12.el5.ia64", "5Server:vsftpd-debuginfo-0:2.0.5-12.el5.ppc", "5Server:vsftpd-debuginfo-0:2.0.5-12.el5.s390x", "5Server:vsftpd-debuginfo-0:2.0.5-12.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0295" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "vsftpd: memory leak when deny_file option is set" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.