CVE-2021-40524
https://notcve.org/view.php?id=CVE-2021-40524
In Pure-FTPd before 1.0.50, an incorrect max_filesize quota mechanism in the server allows attackers to upload files of unbounded size, which may lead to denial of service or a server hang. This occurs because a certain greater-than-zero test does not anticipate an initial -1 value. (Versions 1.0.23 through 1.0.49 are affected.) En Pure-FTPd antes de la versión 1.0.50, un mecanismo incorrecto de cuota max_filesize en el servidor permite a los atacantes subir archivos de tamaño no limitado, lo que puede llevar a la denegación de servicio o a la caída del servidor. Esto ocurre porque una determinada prueba mayor que cero no anticipa un valor inicial de -1. • https://github.com/jedisct1/pure-ftpd/commit/37ad222868e52271905b94afea4fc780d83294b4 https://github.com/jedisct1/pure-ftpd/compare/1.0.49...1.0.50 https://github.com/jedisct1/pure-ftpd/pull/158 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2020-9274
https://notcve.org/view.php?id=CVE-2020-9274
An issue was discovered in Pure-FTPd 1.0.49. An uninitialized pointer vulnerability has been detected in the diraliases linked list. When the *lookup_alias(const char alias) or print_aliases(void) function is called, they fail to correctly detect the end of the linked list and try to access a non-existent list member. This is related to init_aliases in diraliases.c. Se detectó un problema en Pure-FTPd versión 1.0.49. • https://github.com/jedisct1/pure-ftpd/commit/8d0d42542e2cb7a56d645fbe4d0ef436e38bcefa https://lists.debian.org/debian-lts-announce/2020/02/msg00029.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22P44PECZWNDP7CMBL7NRBMNFS73C5Z2 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B5NSUDWXZVWUCL6R2PTX3KBB42Z62CA5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U5DBVHJCXWRSJPNJQCJQCKZF6ZDPZCKA https://security.gentoo.org • CWE-824: Access of Uninitialized Pointer •
CVE-2011-1575
https://notcve.org/view.php?id=CVE-2011-1575
The STARTTLS implementation in ftp_parser.c in Pure-FTPd before 1.0.30 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted FTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. La implementación de STARTTLS en ftp_parser.c de Pure-FTPd en versiones anteriores a 1.0.30 no restringe correctamente el buffer de entrada/salida, que permite a los atacantes a realizar "man-in-the-middle" para insertar comandos en las sesiones FTP cifradas mediante el envío de un comando en claro que se procesa después de TLS esté funcionando, se relaciona con una "inyección de comandos de texto claro" es un problema similar a CVE-2011-0411. • http://archives.pureftpd.org/archives.cgi?100:mss:3906:201103:cpeojfkblajnpinkeadd http://archives.pureftpd.org/archives.cgi?100:mss:3910:201103:cpeojfkblajnpinkeadd http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html http://lists.opensuse.org/opensuse-updates/2011-05/msg00029.html http://openwall.com/lists/oss-security/2011/04/11/14 http://openwall.com/lists/oss-security/2011/04/11/3 http://openwall.com/lists/oss-security/2011/04/11/7 http://openwall.com/lists& • CWE-399: Resource Management Errors •
CVE-2011-0418 – FreeBSD 9.1 - 'ftpd' Remote Denial of Service
https://notcve.org/view.php?id=CVE-2011-0418
The glob implementation in Pure-FTPd before 1.0.32, and in libc in NetBSD 5.1, does not properly expand expressions containing curly brackets, which allows remote authenticated users to cause a denial of service (memory consumption) via a crafted FTP STAT command. La implementación del comando glob de Pure-FTPd en versiones anteriores a 1.0.32, y en libc de NetBSD 5.1, no expande apropiadamente las expresiones que contienen llaves, lo que permite a usuarios autenticados remotos provocar una denegación de servicio (consumo de toda la memoria) a través de un comando FTP STAT modificado. Multiple vendors are affected by a memory exhaustion vulnerability in libc/glob(3) GLOB_BRACE|GLOB_LIMIT. • https://www.exploit-db.com/exploits/24450 http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/glob.c#rev1.28 http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/glob.c.diff?r1=1.27&r2=1.28&f=h http://securityreason.com/achievement_securityalert/97 http://securityreason.com/securityalert/8228 http://www.mandriva.com/security/advisories?name=MDVSA-2011:094 http://www.pureftpd.org/project/pure-ftpd/news http://www.securityfocus.com/bid/47671 http://www.vupen.com • CWE-20: Improper Input Validation •