First published: Thu Mar 03 2011(Updated: )
An integer overflow flaw was reported [1],[2] in the mod_sftp module of ProFTPD. If a specially crafted SSH message was sent to a ProFTPD server using mod_sftp, it could lead to the allocation of enormous amounts of memory and an eventual OOM termination by the kernel. This issue was assigned the name <a href="https://access.redhat.com/security/cve/CVE-2011-1137">CVE-2011-1137</a> [3]. It was fixed in CVS [4],[5],[6] References: [1] <a href="http://bugs.proftpd.org/show_bug.cgi?id=3586">http://bugs.proftpd.org/show_bug.cgi?id=3586</a> [2] <a href="http://www.exploit-db.com/exploits/16129/">http://www.exploit-db.com/exploits/16129/</a> [3] <a href="http://www.openwall.com/lists/oss-security/2011/03/02/5">http://www.openwall.com/lists/oss-security/2011/03/02/5</a> [4] <a href="http://proftp.cvs.sourceforge.net/viewvc/proftp/proftpd/contrib/mod_sftp/packet.c?r1=1.14.2.2&r2=1.14.2.3">http://proftp.cvs.sourceforge.net/viewvc/proftp/proftpd/contrib/mod_sftp/packet.c?r1=1.14.2.2&r2=1.14.2.3</a> [5] <a href="http://proftp.cvs.sourceforge.net/viewvc/proftp/proftpd/contrib/mod_sftp/packet.h?r1=1.3&r2=1.3.2.1">http://proftp.cvs.sourceforge.net/viewvc/proftp/proftpd/contrib/mod_sftp/packet.h?r1=1.3&r2=1.3.2.1</a> [6] <a href="http://proftp.cvs.sourceforge.net/viewvc/proftp/proftpd/contrib/mod_sftp/mod_sftp.c?r1=1.29.2.1&r2=1.29.2.2">http://proftp.cvs.sourceforge.net/viewvc/proftp/proftpd/contrib/mod_sftp/mod_sftp.c?r1=1.29.2.1&r2=1.29.2.2</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ProFTPD | <=1.3.3 | |
ProFTPD | =1.2.0 | |
ProFTPD | =1.2.0-pre10 | |
ProFTPD | =1.2.0-pre9 | |
ProFTPD | =1.2.0-rc1 | |
ProFTPD | =1.2.0-rc2 | |
ProFTPD | =1.2.0-rc3 | |
ProFTPD | =1.2.1 | |
ProFTPD | =1.2.2 | |
ProFTPD | =1.2.2-rc1 | |
ProFTPD | =1.2.2-rc2 | |
ProFTPD | =1.2.2-rc3 | |
ProFTPD | =1.2.3 | |
ProFTPD | =1.2.4 | |
ProFTPD | =1.2.5 | |
ProFTPD | =1.2.5-rc1 | |
ProFTPD | =1.2.5-rc2 | |
ProFTPD | =1.2.5-rc3 | |
ProFTPD | =1.2.6 | |
ProFTPD | =1.2.6-rc1 | |
ProFTPD | =1.2.6-rc2 | |
ProFTPD | =1.2.7 | |
ProFTPD | =1.2.7-rc1 | |
ProFTPD | =1.2.7-rc2 | |
ProFTPD | =1.2.7-rc3 | |
ProFTPD | =1.2.8 | |
ProFTPD | =1.2.8-rc1 | |
ProFTPD | =1.2.8-rc2 | |
ProFTPD | =1.2.9 | |
ProFTPD | =1.2.9-rc1 | |
ProFTPD | =1.2.9-rc2 | |
ProFTPD | =1.2.9-rc3 | |
ProFTPD | =1.2.10 | |
ProFTPD | =1.2.10-rc1 | |
ProFTPD | =1.2.10-rc2 | |
ProFTPD | =1.2.10-rc3 | |
ProFTPD | =1.3.0 | |
ProFTPD | =1.3.0-a | |
ProFTPD | =1.3.0-rc1 | |
ProFTPD | =1.3.0-rc2 | |
ProFTPD | =1.3.0-rc3 | |
ProFTPD | =1.3.0-rc4 | |
ProFTPD | =1.3.0-rc5 | |
ProFTPD | =1.3.1 | |
ProFTPD | =1.3.1-rc1 | |
ProFTPD | =1.3.1-rc2 | |
ProFTPD | =1.3.1-rc3 | |
ProFTPD | =1.3.2 | |
ProFTPD | =1.3.2-a | |
ProFTPD | =1.3.2-b | |
ProFTPD | =1.3.2-c | |
ProFTPD | =1.3.2-d | |
ProFTPD | =1.3.2-e | |
ProFTPD | =1.3.2-rc1 | |
ProFTPD | =1.3.2-rc2 | |
ProFTPD | =1.3.2-rc3 | |
ProFTPD | =1.3.2-rc4 | |
ProFTPD | =1.3.3 | |
ProFTPD | =1.3.3-a | |
ProFTPD | =1.3.3-b | |
ProFTPD | =1.3.3-c | |
ProFTPD | =1.3.3-rc1 | |
ProFTPD | =1.3.3-rc2 | |
ProFTPD | =1.3.3-rc3 | |
ProFTPD | =1.3.3-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1137 is classified as a high severity vulnerability due to its potential to cause an out-of-memory (OOM) termination in affected ProFTPD servers.
To fix CVE-2011-1137, you should upgrade to a version of ProFTPD that is newer than 1.3.3 or any available patch provided by the vendor.
CVE-2011-1137 affects ProFTPD versions up to and including 1.3.3, as well as specific earlier versions such as 1.2.0 through 1.2.10.
If exploited, CVE-2011-1137 can lead to the server consuming excessive memory, potentially resulting in a denial-of-service condition.
Yes, CVE-2011-1137 is remotely exploitable through specially crafted SSH messages sent to a vulnerable ProFTPD server.