Lucene search

K
nvd[email protected]NVD:CVE-2011-1575
HistoryMay 23, 2011 - 10:55 p.m.

CVE-2011-1575

2011-05-2322:55:01
CWE-399
web.nvd.nist.gov
1

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

6.5 Medium

AI Score

Confidence

Low

0.897 High

EPSS

Percentile

98.8%

The STARTTLS implementation in ftp_parser.c in Pure-FTPd before 1.0.30 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted FTP sessions by sending a cleartext command that is processed after TLS is in place, related to a “plaintext command injection” attack, a similar issue to CVE-2011-0411.

Affected configurations

NVD
Node
pureftpdpure-ftpdRange1.0.29
OR
pureftpdpure-ftpdMatch0.90
OR
pureftpdpure-ftpdMatch0.91
OR
pureftpdpure-ftpdMatch0.92
OR
pureftpdpure-ftpdMatch0.93
OR
pureftpdpure-ftpdMatch0.94
OR
pureftpdpure-ftpdMatch0.95
OR
pureftpdpure-ftpdMatch0.95-pre1
OR
pureftpdpure-ftpdMatch0.95-pre2
OR
pureftpdpure-ftpdMatch0.95-pre3
OR
pureftpdpure-ftpdMatch0.95-pre4
OR
pureftpdpure-ftpdMatch0.95.1
OR
pureftpdpure-ftpdMatch0.95.2
OR
pureftpdpure-ftpdMatch0.96
OR
pureftpdpure-ftpdMatch0.96.1
OR
pureftpdpure-ftpdMatch0.96pre1
OR
pureftpdpure-ftpdMatch0.97-final
OR
pureftpdpure-ftpdMatch0.97.1
OR
pureftpdpure-ftpdMatch0.97.2
OR
pureftpdpure-ftpdMatch0.97.3
OR
pureftpdpure-ftpdMatch0.97.4
OR
pureftpdpure-ftpdMatch0.97.5
OR
pureftpdpure-ftpdMatch0.97.6
OR
pureftpdpure-ftpdMatch0.97.7
OR
pureftpdpure-ftpdMatch0.97.7pre1
OR
pureftpdpure-ftpdMatch0.97.7pre2
OR
pureftpdpure-ftpdMatch0.97.7pre3
OR
pureftpdpure-ftpdMatch0.97pre1
OR
pureftpdpure-ftpdMatch0.97pre2
OR
pureftpdpure-ftpdMatch0.97pre3
OR
pureftpdpure-ftpdMatch0.97pre4
OR
pureftpdpure-ftpdMatch0.97pre5
OR
pureftpdpure-ftpdMatch0.98-final
OR
pureftpdpure-ftpdMatch0.98.1
OR
pureftpdpure-ftpdMatch0.98.2
OR
pureftpdpure-ftpdMatch0.98.2a
OR
pureftpdpure-ftpdMatch0.98.3
OR
pureftpdpure-ftpdMatch0.98.4
OR
pureftpdpure-ftpdMatch0.98.5
OR
pureftpdpure-ftpdMatch0.98.6
OR
pureftpdpure-ftpdMatch0.98.7
OR
pureftpdpure-ftpdMatch0.98pre1
OR
pureftpdpure-ftpdMatch0.98pre2
OR
pureftpdpure-ftpdMatch0.99
OR
pureftpdpure-ftpdMatch0.99.1
OR
pureftpdpure-ftpdMatch0.99.1a
OR
pureftpdpure-ftpdMatch0.99.1b
OR
pureftpdpure-ftpdMatch0.99.2
OR
pureftpdpure-ftpdMatch0.99.2a
OR
pureftpdpure-ftpdMatch0.99.3
OR
pureftpdpure-ftpdMatch0.99.4
OR
pureftpdpure-ftpdMatch0.99.9
OR
pureftpdpure-ftpdMatch0.99a
OR
pureftpdpure-ftpdMatch0.99b
OR
pureftpdpure-ftpdMatch0.99pre1
OR
pureftpdpure-ftpdMatch0.99pre2
OR
pureftpdpure-ftpdMatch1.0.0
OR
pureftpdpure-ftpdMatch1.0.1
OR
pureftpdpure-ftpdMatch1.0.2
OR
pureftpdpure-ftpdMatch1.0.3
OR
pureftpdpure-ftpdMatch1.0.4
OR
pureftpdpure-ftpdMatch1.0.5
OR
pureftpdpure-ftpdMatch1.0.6
OR
pureftpdpure-ftpdMatch1.0.7
OR
pureftpdpure-ftpdMatch1.0.8
OR
pureftpdpure-ftpdMatch1.0.9
OR
pureftpdpure-ftpdMatch1.0.10
OR
pureftpdpure-ftpdMatch1.0.11
OR
pureftpdpure-ftpdMatch1.0.12
OR
pureftpdpure-ftpdMatch1.0.13a
OR
pureftpdpure-ftpdMatch1.0.14
OR
pureftpdpure-ftpdMatch1.0.15
OR
pureftpdpure-ftpdMatch1.0.16a
OR
pureftpdpure-ftpdMatch1.0.16b
OR
pureftpdpure-ftpdMatch1.0.16c
OR
pureftpdpure-ftpdMatch1.0.17
OR
pureftpdpure-ftpdMatch1.0.17a
OR
pureftpdpure-ftpdMatch1.0.18
OR
pureftpdpure-ftpdMatch1.0.19
OR
pureftpdpure-ftpdMatch1.0.20
OR
pureftpdpure-ftpdMatch1.0.21
OR
pureftpdpure-ftpdMatch1.0.22
OR
pureftpdpure-ftpdMatch1.0.24
OR
pureftpdpure-ftpdMatch1.0.25
OR
pureftpdpure-ftpdMatch1.0.26
OR
pureftpdpure-ftpdMatch1.0.27
OR
pureftpdpure-ftpdMatch1.0.28

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

6.5 Medium

AI Score

Confidence

Low

0.897 High

EPSS

Percentile

98.8%