In Pure-FTPd before 1.0.50, an incorrect max_filesize quota mechanism in the server allows attackers to upload files of unbounded size, which may lead to denial of service or a server hang. This occurs because a certain greater-than-zero test does not anticipate an initial -1 value. (Versions 1.0.23 through 1.0.49 are affected.)
References
| Link | Resource |
|---|---|
| https://github.com/jedisct1/pure-ftpd/commit/37ad222868e52271905b94afea4fc780d83294b4 | Patch Third Party Advisory |
| https://github.com/jedisct1/pure-ftpd/compare/1.0.49...1.0.50 | Patch Third Party Advisory |
| https://github.com/jedisct1/pure-ftpd/pull/158 | Exploit Third Party Advisory |
| https://github.com/jedisct1/pure-ftpd/commit/37ad222868e52271905b94afea4fc780d83294b4 | Patch Third Party Advisory |
| https://github.com/jedisct1/pure-ftpd/compare/1.0.49...1.0.50 | Patch Third Party Advisory |
| https://github.com/jedisct1/pure-ftpd/pull/158 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:24
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/jedisct1/pure-ftpd/commit/37ad222868e52271905b94afea4fc780d83294b4 - Patch, Third Party Advisory | |
| References | () https://github.com/jedisct1/pure-ftpd/compare/1.0.49...1.0.50 - Patch, Third Party Advisory | |
| References | () https://github.com/jedisct1/pure-ftpd/pull/158 - Exploit, Third Party Advisory |
26 Nov 2021, 19:49
| Type | Values Removed | Values Added |
|---|---|---|
| References | (CONFIRM) https://github.com/jedisct1/pure-ftpd/compare/1.0.49...1.0.50 - Patch, Third Party Advisory | |
| References | (CONFIRM) https://github.com/jedisct1/pure-ftpd/commit/37ad222868e52271905b94afea4fc780d83294b4 - Patch, Third Party Advisory | |
| CPE | cpe:2.3:a:pureftpd:pure-ftpd:*:*:*:*:*:*:*:* |
24 Nov 2021, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | In Pure-FTPd before 1.0.50, an incorrect max_filesize quota mechanism in the server allows attackers to upload files of unbounded size, which may lead to denial of service or a server hang. This occurs because a certain greater-than-zero test does not anticipate an initial -1 value. (Versions 1.0.23 through 1.0.49 are affected.) | |
| References |
|
10 Sep 2021, 19:57
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-434 | |
| CPE | cpe:2.3:a:pureftpd:pure-ftpd:1.0.49:*:*:*:*:*:*:* | |
| References | (MISC) https://github.com/jedisct1/pure-ftpd/pull/158 - Exploit, Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
05 Sep 2021, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2021-09-05 19:15
Updated : 2024-11-21 06:24
NVD link : CVE-2021-40524
Mitre link : CVE-2021-40524
CVE.ORG link : CVE-2021-40524
JSON object : View
Products Affected
pureftpd
- pure-ftpd
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
