As mentioned at http://www.pureftpd.org/project/pure-ftpd/news and the Pure-FTPd mailing list, versions of Pure-FTPd before 1.0.32 are vulnerable to a denial-of-service attack related to glob brace expansion. This is fixed in Pure-FTPd 1.0.32.
+*pure-ftpd-1.0.32 (02 May 2011)
+ 02 May 2011; Lars Wendler <firstname.lastname@example.org> +pure-ftpd-1.0.32.ebuild:
+ Security bump. Thanks to Mark Wagner for reporting this issue in bug #365751.
pure-ftpd-1.0.32 is now in the tree and ready for stabilization.
Arches, please test and mark stable:
Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 sparc x86"
Stable for HPPA.
ppc/ppc64 stable, last arch done
GLSA vote: yes
Yes, too. GLSA request filed.
The glob implementation in Pure-FTPd before 1.0.32, and in libc in NetBSD
5.1, does not properly expand expressions containing curly brackets, which
allows remote authenticated users to cause a denial of service (memory
consumption) via a crafted FTP STAT command.
This issue was resolved and addressed in
GLSA 201110-25 at http://security.gentoo.org/glsa/glsa-201110-25.xml
by GLSA coordinator Tim Sammut (underling).