exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2011-094

Mandriva Linux Security Advisory 2011-094
Posted May 20, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-094 - A denial-of-service attack related to glob brace expansion was discovered and fixed in pure-ftpd.

tags | advisory
systems | linux, mandriva
advisories | CVE-2011-0418
SHA-256 | 18700e0c74f1cc13ea52699ca83aaf6809a6ec0df7836b255d7eb1aa33836167

Mandriva Linux Security Advisory 2011-094

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:094
http://www.mandriva.com/security/
_______________________________________________________________________

Package : pure-ftpd
Date : May 19, 2011
Affected: 2009.0, 2010.1, Corporate 4.0, Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A denial-of-service (DoS) attack related to glob brace expansion was
discovered and fixed in pure-ftpd (CVE-2011-0418).

Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490

The updated packages have been upgraded to the latest 1.0.32 version
which is not vulnerable to this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0418
http://www.pureftpd.org/project/pure-ftpd/news
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2009.0:
2acd88195b55f8a53e0f22ccd5260c24 2009.0/i586/pure-ftpd-1.0.32-0.1mdv2009.0.i586.rpm
bfac76c40846a52ddf9b8a1abc5edf3c 2009.0/i586/pure-ftpd-anon-upload-1.0.32-0.1mdv2009.0.i586.rpm
b1e3fcd7ffa2259f02e186d4c5dc50a3 2009.0/i586/pure-ftpd-anonymous-1.0.32-0.1mdv2009.0.i586.rpm
f58daf4b54a354e82a794d100d4781a6 2009.0/SRPMS/pure-ftpd-1.0.32-0.1mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
1ef86906a451c694bdba178f9371ff9d 2009.0/x86_64/pure-ftpd-1.0.32-0.1mdv2009.0.x86_64.rpm
4f68287740f187b37b3e7d5cf081e197 2009.0/x86_64/pure-ftpd-anon-upload-1.0.32-0.1mdv2009.0.x86_64.rpm
4b257580afe20999e43f34fa921d70d6 2009.0/x86_64/pure-ftpd-anonymous-1.0.32-0.1mdv2009.0.x86_64.rpm
f58daf4b54a354e82a794d100d4781a6 2009.0/SRPMS/pure-ftpd-1.0.32-0.1mdv2009.0.src.rpm

Mandriva Linux 2010.1:
ccc0647d427a31a103ca739d0ba20bfc 2010.1/i586/pure-ftpd-1.0.32-0.1mdv2010.2.i586.rpm
72642833bdcc96ce5facd5952b06066a 2010.1/i586/pure-ftpd-anon-upload-1.0.32-0.1mdv2010.2.i586.rpm
6e4956263a8655cc5403a8f5958019b1 2010.1/i586/pure-ftpd-anonymous-1.0.32-0.1mdv2010.2.i586.rpm
ca752489c3af7bd14ab5b7d1c232e72f 2010.1/SRPMS/pure-ftpd-1.0.32-0.1mdv2010.2.src.rpm

Mandriva Linux 2010.1/X86_64:
c3361b5b91ee6429933b70785eba5a80 2010.1/x86_64/pure-ftpd-1.0.32-0.1mdv2010.2.x86_64.rpm
1a11cce6839229c1f312f56c322ca615 2010.1/x86_64/pure-ftpd-anon-upload-1.0.32-0.1mdv2010.2.x86_64.rpm
ccdf372f525a69dca66ed58d1241dfa2 2010.1/x86_64/pure-ftpd-anonymous-1.0.32-0.1mdv2010.2.x86_64.rpm
ca752489c3af7bd14ab5b7d1c232e72f 2010.1/SRPMS/pure-ftpd-1.0.32-0.1mdv2010.2.src.rpm

Corporate 4.0:
0441583b4381e946911a13795b6edccf corporate/4.0/i586/pure-ftpd-1.0.32-0.1.20060mlcs4.i586.rpm
375127a30296a60eac2152905412b798 corporate/4.0/i586/pure-ftpd-anon-upload-1.0.32-0.1.20060mlcs4.i586.rpm
38b01d4b3584d3995ca7790b25ccaae6 corporate/4.0/i586/pure-ftpd-anonymous-1.0.32-0.1.20060mlcs4.i586.rpm
dc7cec35f7bbb78c15ef04dc617a9c8a corporate/4.0/SRPMS/pure-ftpd-1.0.32-0.1.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
58de36c82139959d006fe0892f66d696 corporate/4.0/x86_64/pure-ftpd-1.0.32-0.1.20060mlcs4.x86_64.rpm
42f29b1fd2b858908e10ffd5bcd07247 corporate/4.0/x86_64/pure-ftpd-anon-upload-1.0.32-0.1.20060mlcs4.x86_64.rpm
6bad2661dd405402bd966222fdaec9e0 corporate/4.0/x86_64/pure-ftpd-anonymous-1.0.32-0.1.20060mlcs4.x86_64.rpm
dc7cec35f7bbb78c15ef04dc617a9c8a corporate/4.0/SRPMS/pure-ftpd-1.0.32-0.1.20060mlcs4.src.rpm

Mandriva Enterprise Server 5:
ead5a422b7e60c1af65a81c53b618260 mes5/i586/pure-ftpd-1.0.32-0.1mdvmes5.2.i586.rpm
ccc02756eb2130f16967487916cef75f mes5/i586/pure-ftpd-anon-upload-1.0.32-0.1mdvmes5.2.i586.rpm
aca8ae84abda72076ee40a99e1d145ad mes5/i586/pure-ftpd-anonymous-1.0.32-0.1mdvmes5.2.i586.rpm
f9015d52a7cb03280973a24874bf6267 mes5/SRPMS/pure-ftpd-1.0.32-0.1mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
641b2ef9d80017720523e3102ca2b78c mes5/x86_64/pure-ftpd-1.0.32-0.1mdvmes5.2.x86_64.rpm
5109cfc4c1747e0834fa47bb37269bf3 mes5/x86_64/pure-ftpd-anon-upload-1.0.32-0.1mdvmes5.2.x86_64.rpm
8baf20ef3e7b2b730e76d9310d8b8c09 mes5/x86_64/pure-ftpd-anonymous-1.0.32-0.1mdvmes5.2.x86_64.rpm
f9015d52a7cb03280973a24874bf6267 mes5/SRPMS/pure-ftpd-1.0.32-0.1mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFN1SCXmqjQ0CJFipgRAt1pAKClEOFhAM+KNvN0SF0sP88LdiSQSACgscCW
InlPA3J98nnGsu3MmJkc3iA=
=S/mD
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close