Summary: | <net-ftp/pure-ftpd-1.0.32: denial-of-service attack vulnerability (CVE-2011-0418) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Mark Wagner <carnildo> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | net-ftp, polynomial-c |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Mark Wagner
2011-05-02 19:52:16 UTC
+*pure-ftpd-1.0.32 (02 May 2011) + + 02 May 2011; Lars Wendler <polynomial-c@gentoo.org> +pure-ftpd-1.0.32.ebuild: + Security bump. Thanks to Mark Wagner for reporting this issue in bug #365751. + pure-ftpd-1.0.32 is now in the tree and ready for stabilization. Thanks, folks. Arches, please test and mark stable: =net-ftp/pure-ftpd-1.0.32 Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 sparc x86" amd64 done x86 stable Stable for HPPA. alpha/arm/ia64/sparc stable ppc/ppc64 stable, last arch done GLSA vote: yes Yes, too. GLSA request filed. CVE-2011-0418 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0418): The glob implementation in Pure-FTPd before 1.0.32, and in libc in NetBSD 5.1, does not properly expand expressions containing curly brackets, which allows remote authenticated users to cause a denial of service (memory consumption) via a crafted FTP STAT command. This issue was resolved and addressed in GLSA 201110-25 at http://security.gentoo.org/glsa/glsa-201110-25.xml by GLSA coordinator Tim Sammut (underling). |