GLSA 200407-04: Pure-FTPd: Potential DoS when maximum connections is reached

Severity:normal
Title:Pure-FTPd: Potential DoS when maximum connections is reached
Date:07/04/2004
Bugs: #54590
ID:200407-04

Synopsis

Pure-FTPd contains a bug potentially allowing a Denial of Service attack when the maximum number of connections is reached.

Background

Pure-FTPd is a fast, production-quality and standards-compliant FTP server.

Affected packages

Package Vulnerable Unaffected Architecture(s)
net-ftp/pure-ftpd <= 1.0.18 >= 1.0.18-r1 All supported architectures

Description

Pure-FTPd contains a bug in the accept_client function handling the setup of new connections.

Impact

When the maximum number of connections is reached an attacker could exploit this vulnerability to perform a Denial of Service attack.

Workaround

There is no known workaround at this time. All users are encouraged to upgrade to the latest available version.

Resolution

All Pure-FTPd users should upgrade to the latest stable version:

    # emerge sync
    
    # emerge -pv ">=net-ftp/pure-ftpd-1.0.18-r1"
    # emerge ">=net-ftp/pure-ftpd-1.0.18-r1"

References

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200407-04.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

Thank you!