CVE-2011-0762
Summary
| CVE | CVE-2011-0762 |
|---|---|
| State | PUBLISHED |
| Assigner | certcc |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2011-03-02 20:00:01 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
SingleConfidentiality
NoneIntegrity
NoneAvailability
PartialAV:N/AC:L/Au:S/C:N/I:N/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Canonical | Ubuntu Linux | 10.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 10.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 6.06 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 8.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 9.10 | All | All | All |
| Operating System | Debian | Debian Linux | 5.0 | All | All | All |
| Operating System | Debian | Debian Linux | 6.0 | All | All | All |
| Operating System | Debian | Debian Linux | 7.0 | All | All | All |
| Operating System | Fedoraproject | Fedora | 13 | All | All | All |
| Operating System | Fedoraproject | Fedora | 14 | All | All | All |
| Operating System | Fedoraproject | Fedora | 15 | All | All | All |
| Operating System | Opensuse | Opensuse | 11.2 | All | All | All |
| Operating System | Opensuse | Opensuse | 11.3 | All | All | All |
| Operating System | Opensuse | Opensuse | 11.4 | All | All | All |
| Operating System | Suse | Linux Enterprise Server | 10 | sp3 | All | All |
| Operating System | Suse | Linux Enterprise Server | 10 | sp4 | All | All |
| Operating System | Suse | Linux Enterprise Server | 11 | sp1 | All | All |
| Operating System | Suse | Linux Enterprise Server | 9 | All | All | All |
| Application | Vsftpd Project | Vsftpd | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| CERT Vulnerability Notes Database | af854a3a-2127-422b-91ae-364da2661108 | www.kb.cert.org | Broken Link |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Third Party Advisory |
| JVN#37417423: Multiple vulnerabilities in SolarView Compact | af854a3a-2127-422b-91ae-364da2661108 | jvn.jp | Third Party Advisory |
| vsftpd vsf_filename_passes_filter() Bug Lets Remote Authenticated Users Deny Service - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | Third Party Advisory, VDB Entry |
| '[security bulletin] HPSBMU02752 SSRT100802 rev.1 HP Insight Control Software for Linux (IC-Linux), R' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | Issue Tracking, Third Party Advisory |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | Third Party Advisory, VDB Entry |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Third Party Advisory |
| [security-announce] SUSE Security Summary Report: SUSE-SR:2011:009 | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List, Third Party Advisory |
| Support / Security / Advisories / / MDVSA-2011:049 | Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | Third Party Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Third Party Advisory |
| All about me - Maksymilian Arciemowicz - cxib.net | af854a3a-2127-422b-91ae-364da2661108 | cxib.net | Broken Link |
| [SECURITY] Fedora 15 Update: vsftpd-2.3.4-1.fc15 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | Third Party Advisory |
| vsftpd 2.3.2 Denial of Service Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.exploit-db.com | Exploit, Third Party Advisory, VDB Entry |
| [SECURITY] Fedora 13 Update: vsftpd-2.3.4-1.fc13 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | Third Party Advisory |
| [SECURITY] Fedora 14 Update: vsftpd-2.3.4-1.fc14 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | Third Party Advisory |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| vsftpd 2.3.2 remote denial-of-service - SecurityReason.com | af854a3a-2127-422b-91ae-364da2661108 | securityreason.com | Exploit, Third Party Advisory |
| USN-1098-1: vsftpd vulnerability | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | Third Party Advisory |
| vsftpd.beasts.org/users/cevans/untar/vsftpd-2.3.4/Changelog | af854a3a-2127-422b-91ae-364da2661108 | vsftpd.beasts.org | Broken Link |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Third Party Advisory |
| #622741 - vsftpd: upgrade stable to fix remote DoS (CVE-2011-0762) - Debian Bug report logs | af854a3a-2127-422b-91ae-364da2661108 | bugs.debian.org | Issue Tracking, Third Party Advisory |
| vsftpd FTP Server 'ls.c' Remote Denial of Service Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Exploit, Third Party Advisory, VDB Entry |
| Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | Third Party Advisory |
| Debian -- Security Information -- DSA-2305-1 vsftpd | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | Third Party Advisory |
| vsftpd 2.3.2 remote denial-of-service ( Research Advisory ) - SecurityReason.com | af854a3a-2127-422b-91ae-364da2661108 | securityreason.com | Exploit, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.