Executive Summary

Summary
Title vsftpd vulnerability
Informations
Name USN-1288-1 First vendor Publication 2011-12-07
Vendor Ubuntu Last vendor Modification 2011-12-07
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score 7.8 Attack Range Network
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 11.10 - Ubuntu 11.04 - Ubuntu 10.10 - Ubuntu 10.04 LTS

Summary:

Vsftpd or other applications could be made to crash if vsftpd received specially crafted network traffic.

Software Description: - vsftpd: FTP server written for security

Details:

It was discovered that the 2.6.35 and earlier Linux kernel does not properly handle a high rate of creation and cleanup of network namespaces, which makes it easier for remote attackers to cause a denial of service (memory consumption) in applications that require a separate namespace per connection, like vsftpd. This update adjusts vsftpd to only use network namespaces on kernels that are known to be not affected.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 11.10:
vsftpd 2.3.2-3ubuntu5.1

Ubuntu 11.04:
vsftpd 2.3.2-3ubuntu4.1

Ubuntu 10.10:
vsftpd 2.3.0~pre2-4ubuntu2.3

Ubuntu 10.04 LTS:
vsftpd 2.2.2-3ubuntu6.3

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1288-1
CVE-2011-2189

Package Information:
https://launchpad.net/ubuntu/+source/vsftpd/2.3.2-3ubuntu5.1
https://launchpad.net/ubuntu/+source/vsftpd/2.3.2-3ubuntu4.1
https://launchpad.net/ubuntu/+source/vsftpd/2.3.0~pre2-4ubuntu2.3
https://launchpad.net/ubuntu/+source/vsftpd/2.2.2-3ubuntu6.3

Original Source

Url : http://www.ubuntu.com/usn/USN-1288-1

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:15164
 
Oval ID: oval:org.mitre.oval:def:15164
Title: DSA-2305-1 vsftpd -- denial of service
Description: Two security issue have been discovered that affect vsftpd, a lightweight, efficient FTP server written for security. CVE-2011-2189 It was discovered that Linux kernels less than 2.6.35 are considerably slower in releasing than in the creation of network namespaces. As a result of this and because vsftpd is using this feature as a security enhancement to provide network isolation for connections, it is possible to cause denial of service conditions due to excessive memory allocations by the kernel. This is technically no vsftpd flaw, but a kernel issue. However, this feature has legitimate use cases and backporting the specific kernel patch is too intrusive. Additionally, a local attacker requires the CAP_SYS_ADMIN capability to abuse this functionality. Therefore, as a fix, a kernel version check has been added to vsftpd in order to disable this feature for kernels less than 2.6.35. CVE-2011-0762 Maksymilian Arciemowicz discovered that vsftpd is incorrectly handling certain glob expressions in STAT commands. This allows a remote authenticated attacker to conduct denial of service attacks via crafted STAT commands.
Family: unix Class: patch
Reference(s): DSA-2305-1
CVE-2011-0762
CVE-2011-2189
Version: 5
Platform(s): Debian GNU/Linux 5.0
Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): vsftpd
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15201
 
Oval ID: oval:org.mitre.oval:def:15201
Title: USN-1288-1 -- vsftpd vulnerability
Description: vsftpd: FTP server written for security Vsftpd or other applications could be made to crash if vsftpd received specially crafted network traffic.
Family: unix Class: patch
Reference(s): USN-1288-1
CVE-2011-2189
Version: 5
Platform(s): Ubuntu 11.04
Ubuntu 11.10
Ubuntu 10.04
Ubuntu 10.10
Product(s): vsftpd
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 4
Os 3
Os 1202
Os 1
Os 1

OpenVAS Exploits

Date Description
2011-12-09 Name : Ubuntu Update for vsftpd USN-1288-1
File : nvt/gb_ubuntu_USN_1288_1.nasl
2011-10-16 Name : Debian Security Advisory DSA 2305-1 (vsftpd)
File : nvt/deb_2305_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
76805 Linux Kernel net/core/net_namespace.c Network Namespace Cleanup Weakness Remo...

Nessus® Vulnerability Scanner

Date Description
2011-12-07 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1288-1.nasl - Type : ACT_GATHER_INFO
2011-09-20 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2305.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:59:22
  • Multiple Updates