Unrated severityNVD Advisory· Published Mar 2, 2011· Updated Apr 29, 2026
CVE-2011-0762
CVE-2011-0762
Description
The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632.
Affected products
19cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
25- securityreason.com/achievement_securityalert/95nvdExploitThird Party Advisory
- securityreason.com/securityalert/8109nvdExploitThird Party Advisory
- www.exploit-db.com/exploits/16270nvdExploitThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/46617nvdExploitThird Party AdvisoryVDB Entry
- bugs.debian.org/cgi-bin/bugreport.cginvdIssue TrackingThird Party Advisory
- jvn.jp/en/jp/JVN37417423/index.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2011-March/055881.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2011-March/055882.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2011-March/055957.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.htmlnvdMailing ListThird Party Advisory
- marc.infonvdIssue TrackingThird Party Advisory
- www.debian.org/security/2011/dsa-2305nvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2011-0337.htmlnvdThird Party Advisory
- www.securityfocus.com/archive/1/516748/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/idnvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-1098-1nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0547nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0639nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0668nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0713nvdThird Party Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/65873nvdThird Party AdvisoryVDB Entry
- vsftpd.beasts.org/users/cevans/untar/vsftpd-2.3.4/ChangelognvdBroken Link
- cxib.net/stuff/vspoc232.cnvdBroken Link
- www.kb.cert.org/vuls/id/590604nvdBroken Link
News mentions
0No linked articles in our index yet.