CVE-2011-0762 : Detail

CVE-2011-0762

45.28%V4
Network
2011-03-02
18h00 +00:00
2021-02-19
03h06 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-400 Uncontrolled Resource Consumption
The product does not properly control the allocation and maintenance of a limited resource.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4 AV:N/AC:L/Au:S/C:N/I:N/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 16270

Publication date : 2011-03-01 23h00 +00:00
Author : Maksymilian Arciemowicz
EDB Verified : Yes

Products Mentioned

Configuraton 0

Vsftpd_project>>Vsftpd >> Version To (excluding) 2.3.3

Configuraton 0

Canonical>>Ubuntu_linux >> Version 6.06

Canonical>>Ubuntu_linux >> Version 8.04

Canonical>>Ubuntu_linux >> Version 9.10

Canonical>>Ubuntu_linux >> Version 10.04

Canonical>>Ubuntu_linux >> Version 10.10

Configuraton 0

Fedoraproject>>Fedora >> Version 13

Fedoraproject>>Fedora >> Version 14

Fedoraproject>>Fedora >> Version 15

Configuraton 0

Debian>>Debian_linux >> Version 5.0

Debian>>Debian_linux >> Version 6.0

Debian>>Debian_linux >> Version 7.0

Configuraton 0

Opensuse>>Opensuse >> Version 11.2

Opensuse>>Opensuse >> Version 11.3

Opensuse>>Opensuse >> Version 11.4

Suse>>Linux_enterprise_server >> Version 9

Suse>>Linux_enterprise_server >> Version 10

Suse>>Linux_enterprise_server >> Version 10

Suse>>Linux_enterprise_server >> Version 11

References

http://marc.info/?l=bugtraq&m=133226187115472&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=133226187115472&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.vupen.com/english/advisories/2011/0639
Tags : vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0668
Tags : vdb-entry, x_refsource_VUPEN
http://www.debian.org/security/2011/dsa-2305
Tags : vendor-advisory, x_refsource_DEBIAN
http://securityreason.com/securityalert/8109
Tags : third-party-advisory, x_refsource_SREASON
http://www.vupen.com/english/advisories/2011/0547
Tags : vdb-entry, x_refsource_VUPEN
http://www.exploit-db.com/exploits/16270
Tags : exploit, x_refsource_EXPLOIT-DB
http://cxib.net/stuff/vspoc232.c
Tags : x_refsource_MISC
http://www.mandriva.com/security/advisories?name=MDVSA-2011:049
Tags : vendor-advisory, x_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2011/0713
Tags : vdb-entry, x_refsource_VUPEN
http://www.ubuntu.com/usn/USN-1098-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.kb.cert.org/vuls/id/590604
Tags : third-party-advisory, x_refsource_CERT-VN
http://www.securitytracker.com/id?1025186
Tags : vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/46617
Tags : vdb-entry, x_refsource_BID
http://securityreason.com/achievement_securityalert/95
Tags : third-party-advisory, x_refsource_SREASONRES
http://www.redhat.com/support/errata/RHSA-2011-0337.html
Tags : vendor-advisory, x_refsource_REDHAT
http://jvn.jp/en/jp/JVN37417423/index.html
Tags : third-party-advisory, x_refsource_JVN