Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (File Transfer/Sharing)  >   PureFTPd Vendors:
PureFTPd May Allow Remote Users to Deny Service on the Server
SecurityTracker Alert ID:  1001126
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 20 2001
Impact:   Denial of service via network
Exploit Included:  Yes  

Description:   PureFTPd, along with several other FTP daemons, is reported to contain a vulnerability that allows remote users to consume resources on the FTP server.

The PureFTPd's built-in 'ls' command contains a globbing bug that allows remote denial-of-service attacks.

The following command will reportedly consume 100% of CPU time on the server, which can lead to denial of service conditions:

ls .*./*?/.*./*?/.*./*?/.*./*?/.*./*?/.*./*?/.*./*?/.*./*?/.*./*?/


ls */.*/*/.*/*/.*/*/.*/*/.*/*/.*/*/.*/*/.*/*/.*/*/.*/*/.*/*/.*/

Other affected servers are ProFTPd, NetBSD FTP, and Microsoft FTP Service (Version 5.0).

See for additional info.

Impact:   A remote user with access to the FTP server can execute a command that will cause the server to consume a significant amount of CPU resources.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Resource error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.

 Source Message Contents

Subject:  Re: Multiple vendors FTP denial of service

> - PureFTPd (any version) is not vulnerable. Result is "Simplified wildcard
> expression to *" and the 'ls *' output.

	In an ironic twist, PureFTPd (of which you are apparently the author), is
indeed vulnerable to this globbing bug, using variants of the string you
previously posted.  Try:

ls .*./*?/.*./*?/.*./*?/.*./*?/.*./*?/.*./*?/.*./*?/.*./*?/.*./*?/


ls */.*/*/.*/*/.*/*/.*/*/.*/*/.*/*/.*/*/.*/*/.*/*/.*/*/.*/*/.*/

	against your software.  To give you the same level of notice you gave
everyone else, I went ahead and posted this into your bug tracking system
about 30 seconds ago.



Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, LLC