SB2011102610 - Gentoo update for Pure-FTPd



SB2011102610 - Gentoo update for Pure-FTPd

Published: October 26, 2011 Updated: June 28, 2025

Security Bulletin ID SB2011102610
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2011-0418)

The vulnerability allows a remote #AU# to perform service disruption.

The glob implementation in Pure-FTPd before 1.0.32, and in libc in NetBSD 5.1, does not properly expand expressions containing curly brackets, which allows remote authenticated users to cause a denial of service (memory consumption) via a crafted FTP STAT command.


2) Resource management error (CVE-ID: CVE-2011-1575)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The STARTTLS implementation in ftp_parser.c in Pure-FTPd before 1.0.30 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted FTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.


Remediation

Install update from vendor's website.