CVE-2011-1137

Current Description

Integer overflow in the mod_sftp (aka SFTP) module in ProFTPD 1.3.3d and earlier allows remote attackers to cause a denial of service (memory consumption leading to OOM kill) via a malformed SSH message.

Basic Data

PublishedMarch 11, 2011
Last ModifiedSeptember 07, 2011
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-189
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationProftpdProftpd1.2.0*******
    2.3ApplicationProftpdProftpd1.2.0pre10******
    2.3ApplicationProftpdProftpd1.2.0pre9******
    2.3ApplicationProftpdProftpd1.2.0rc1******
    2.3ApplicationProftpdProftpd1.2.0rc2******
    2.3ApplicationProftpdProftpd1.2.0rc3******
    2.3ApplicationProftpdProftpd1.2.1*******
    2.3ApplicationProftpdProftpd1.2.2*******
    2.3ApplicationProftpdProftpd1.2.2rc1******
    2.3ApplicationProftpdProftpd1.2.2rc2******
    2.3ApplicationProftpdProftpd1.2.2rc3******
    2.3ApplicationProftpdProftpd1.2.3*******
    2.3ApplicationProftpdProftpd1.2.4*******
    2.3ApplicationProftpdProftpd1.2.5*******
    2.3ApplicationProftpdProftpd1.2.5rc1******
    2.3ApplicationProftpdProftpd1.2.5rc2******
    2.3ApplicationProftpdProftpd1.2.5rc3******
    2.3ApplicationProftpdProftpd1.2.6*******
    2.3ApplicationProftpdProftpd1.2.6rc1******
    2.3ApplicationProftpdProftpd1.2.6rc2******
    2.3ApplicationProftpdProftpd1.2.7*******
    2.3ApplicationProftpdProftpd1.2.7rc1******
    2.3ApplicationProftpdProftpd1.2.7rc2******
    2.3ApplicationProftpdProftpd1.2.7rc3******
    2.3ApplicationProftpdProftpd1.2.8*******
    2.3ApplicationProftpdProftpd1.2.8rc1******
    2.3ApplicationProftpdProftpd1.2.8rc2******
    2.3ApplicationProftpdProftpd1.2.9*******
    2.3ApplicationProftpdProftpd1.2.9rc1******
    2.3ApplicationProftpdProftpd1.2.9rc2******
    2.3ApplicationProftpdProftpd1.2.9rc3******
    2.3ApplicationProftpdProftpd1.2.10*******
    2.3ApplicationProftpdProftpd1.2.10rc1******
    2.3ApplicationProftpdProftpd1.2.10rc2******
    2.3ApplicationProftpdProftpd1.2.10rc3******
    2.3ApplicationProftpdProftpd1.3.0*******
    2.3ApplicationProftpdProftpd1.3.0a******
    2.3ApplicationProftpdProftpd1.3.0rc1******
    2.3ApplicationProftpdProftpd1.3.0rc2******
    2.3ApplicationProftpdProftpd1.3.0rc3******
    2.3ApplicationProftpdProftpd1.3.0rc4******
    2.3ApplicationProftpdProftpd1.3.0rc5******
    2.3ApplicationProftpdProftpd1.3.1*******
    2.3ApplicationProftpdProftpd1.3.1rc1******
    2.3ApplicationProftpdProftpd1.3.1rc2******
    2.3ApplicationProftpdProftpd1.3.1rc3******
    2.3ApplicationProftpdProftpd1.3.2*******
    2.3ApplicationProftpdProftpd1.3.2a******
    2.3ApplicationProftpdProftpd1.3.2b******
    2.3ApplicationProftpdProftpd1.3.2c******
    2.3ApplicationProftpdProftpd1.3.2d******
    2.3ApplicationProftpdProftpd1.3.2e******
    2.3ApplicationProftpdProftpd1.3.2rc1******
    2.3ApplicationProftpdProftpd1.3.2rc2******
    2.3ApplicationProftpdProftpd1.3.2rc3******
    2.3ApplicationProftpdProftpd1.3.2rc4******
    2.3ApplicationProftpdProftpd1.3.3*******
    2.3ApplicationProftpdProftpd1.3.3a******
    2.3ApplicationProftpdProftpd1.3.3b******
    2.3ApplicationProftpdProftpd1.3.3c******
    2.3ApplicationProftpdProftpd*d******1.3.3
    2.3ApplicationProftpdProftpd1.3.3rc1******
    2.3ApplicationProftpdProftpd1.3.3rc2******
    2.3ApplicationProftpdProftpd1.3.3rc3******
    2.3ApplicationProftpdProftpd1.3.3rc4******

Vulnerable Software List

VendorProductVersions
Proftpd Proftpd *, 1.2.0, 1.2.1, 1.2.10, 1.2.2, 1.2.3, 1.2.4, 1.2.5, 1.2.6, 1.2.7, 1.2.8, 1.2.9, 1.3.0, 1.3.1, 1.3.2, 1.3.3

References

NameSourceURLTags
http://bugs.proftpd.org/show_bug.cgi?id=3586http://bugs.proftpd.org/show_bug.cgi?id=3586CONFIRMPatch
http://bugs.proftpd.org/show_bug.cgi?id=3587http://bugs.proftpd.org/show_bug.cgi?id=3587CONFIRM
FEDORA-2011-5040http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058344.htmlFEDORA
FEDORA-2011-5033http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058356.htmlFEDORA
http://proftp.cvs.sourceforge.net/viewvc/proftp/proftpd/contrib/mod_sftp/mod_sftp.c?r1=1.29.2.1&r2=1.29.2.2http://proftp.cvs.sourceforge.net/viewvc/proftp/proftpd/contrib/mod_sftp/mod_sftp.c?r1=1.29.2.1&r2=1CONFIRMPatch
http://proftp.cvs.sourceforge.net/viewvc/proftp/proftpd/contrib/mod_sftp/packet.c?r1=1.14.2.2&r2=1.14.2.3http://proftp.cvs.sourceforge.net/viewvc/proftp/proftpd/contrib/mod_sftp/packet.c?r1=1.14.2.2&r2=1.1CONFIRMVendor Advisory
http://proftp.cvs.sourceforge.net/viewvc/proftp/proftpd/contrib/mod_sftp/packet.h?r1=1.3&r2=1.3.2.1http://proftp.cvs.sourceforge.net/viewvc/proftp/proftpd/contrib/mod_sftp/packet.h?r1=1.3&r2=1.3.2.1CONFIRMVendor Advisory
43234http://secunia.com/advisories/43234SECUNIAVendor Advisory
43635http://secunia.com/advisories/43635SECUNIAVendor Advisory
43978http://secunia.com/advisories/43978SECUNIA
SSA:2011-095-01http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.485806SLACKWARE
DSA-2185http://www.debian.org/security/2011/dsa-2185DEBIAN
16129http://www.exploit-db.com/exploits/16129/EXPLOIT-DBExploit
46183http://www.securityfocus.com/bid/46183BIDExploit
ADV-2011-0617http://www.vupen.com/english/advisories/2011/0617VUPENVendor Advisory
ADV-2011-0857http://www.vupen.com/english/advisories/2011/0857VUPEN
https://bugzilla.redhat.com/show_bug.cgi?id=681718https://bugzilla.redhat.com/show_bug.cgi?id=681718CONFIRMExploit Patch