MEDIUM · 4.0

CVE-2011-0762

The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob exp...

Vulnerability Description

The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632.

CVSS Score

4.0

MEDIUM

AV:N/AC:L/Au:S/C:N/I:N/A:P
Confidentiality
NONE
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
Vsftpd ProjectVsftpd< 2.3.3
CanonicalUbuntu Linux6.06
FedoraprojectFedora13
DebianDebian Linux5.0
OpensuseOpensuse11.2
SuseLinux Enterprise Server9

Related Weaknesses (CWE)

References

FAQ

What is CVE-2011-0762?

CVE-2011-0762 is a vulnerability with a CVSS score of 4.0 (MEDIUM). The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob exp...

How severe is CVE-2011-0762?

CVE-2011-0762 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2011-0762?

Check the references section above for vendor advisories and patch information. Affected products include: Vsftpd Project Vsftpd, Canonical Ubuntu Linux, Fedoraproject Fedora, Debian Debian Linux, Opensuse Opensuse.