First published: Tue Mar 08 2011(Updated: )
Pure-FTPd has released version 1.0.30 which fixes a STARTTLS flaw similar to Postfix's <a href="https://access.redhat.com/security/cve/CVE-2011-0411">CVE-2011-0411</a> [1]. Upgrading is recommended. References: [1] <a href="http://www.pureftpd.org/project/pure-ftpd/news">http://www.pureftpd.org/project/pure-ftpd/news</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pure-ftpd | <1.0.30 | 1.0.30 |
Pure-FTPd | <=1.0.29 | |
Pure-FTPd | =0.90 | |
Pure-FTPd | =0.91 | |
Pure-FTPd | =0.92 | |
Pure-FTPd | =0.93 | |
Pure-FTPd | =0.94 | |
Pure-FTPd | =0.95 | |
Pure-FTPd | =0.95-pre1 | |
Pure-FTPd | =0.95-pre2 | |
Pure-FTPd | =0.95-pre3 | |
Pure-FTPd | =0.95-pre4 | |
Pure-FTPd | =0.95.1 | |
Pure-FTPd | =0.95.2 | |
Pure-FTPd | =0.96 | |
Pure-FTPd | =0.96.1 | |
Pure-FTPd | =0.96pre1 | |
Pure-FTPd | =0.97-final | |
Pure-FTPd | =0.97.1 | |
Pure-FTPd | =0.97.2 | |
Pure-FTPd | =0.97.3 | |
Pure-FTPd | =0.97.4 | |
Pure-FTPd | =0.97.5 | |
Pure-FTPd | =0.97.6 | |
Pure-FTPd | =0.97.7 | |
Pure-FTPd | =0.97.7pre1 | |
Pure-FTPd | =0.97.7pre2 | |
Pure-FTPd | =0.97.7pre3 | |
Pure-FTPd | =0.97pre1 | |
Pure-FTPd | =0.97pre2 | |
Pure-FTPd | =0.97pre3 | |
Pure-FTPd | =0.97pre4 | |
Pure-FTPd | =0.97pre5 | |
Pure-FTPd | =0.98-final | |
Pure-FTPd | =0.98.1 | |
Pure-FTPd | =0.98.2 | |
Pure-FTPd | =0.98.2a | |
Pure-FTPd | =0.98.3 | |
Pure-FTPd | =0.98.4 | |
Pure-FTPd | =0.98.5 | |
Pure-FTPd | =0.98.6 | |
Pure-FTPd | =0.98.7 | |
Pure-FTPd | =0.98pre1 | |
Pure-FTPd | =0.98pre2 | |
Pure-FTPd | =0.99 | |
Pure-FTPd | =0.99.1 | |
Pure-FTPd | =0.99.1a | |
Pure-FTPd | =0.99.1b | |
Pure-FTPd | =0.99.2 | |
Pure-FTPd | =0.99.2a | |
Pure-FTPd | =0.99.3 | |
Pure-FTPd | =0.99.4 | |
Pure-FTPd | =0.99.9 | |
Pure-FTPd | =0.99a | |
Pure-FTPd | =0.99b | |
Pure-FTPd | =0.99pre1 | |
Pure-FTPd | =0.99pre2 | |
Pure-FTPd | =1.0.0 | |
Pure-FTPd | =1.0.1 | |
Pure-FTPd | =1.0.2 | |
Pure-FTPd | =1.0.3 | |
Pure-FTPd | =1.0.4 | |
Pure-FTPd | =1.0.5 | |
Pure-FTPd | =1.0.6 | |
Pure-FTPd | =1.0.7 | |
Pure-FTPd | =1.0.8 | |
Pure-FTPd | =1.0.9 | |
Pure-FTPd | =1.0.10 | |
Pure-FTPd | =1.0.11 | |
Pure-FTPd | =1.0.12 | |
Pure-FTPd | =1.0.13a | |
Pure-FTPd | =1.0.14 | |
Pure-FTPd | =1.0.15 | |
Pure-FTPd | =1.0.16a | |
Pure-FTPd | =1.0.16b | |
Pure-FTPd | =1.0.16c | |
Pure-FTPd | =1.0.17 | |
Pure-FTPd | =1.0.17a | |
Pure-FTPd | =1.0.18 | |
Pure-FTPd | =1.0.19 | |
Pure-FTPd | =1.0.20 | |
Pure-FTPd | =1.0.21 | |
Pure-FTPd | =1.0.22 | |
Pure-FTPd | =1.0.24 | |
Pure-FTPd | =1.0.25 | |
Pure-FTPd | =1.0.26 | |
Pure-FTPd | =1.0.27 | |
Pure-FTPd | =1.0.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1575 is classified as a medium severity vulnerability due to its potential impact on secure FTP communications.
To fix CVE-2011-1575, upgrade to Pure-FTPd version 1.0.30 or later as it addresses the vulnerability.
CVE-2011-1575 affects Pure-FTPd versions up to 1.0.29 and several earlier versions.
CVE-2011-1575 is a STARTTLS flaw in Pure-FTPd that could allow attackers to compromise secure FTP sessions.
There are no effective workarounds for CVE-2011-1575, so upgrading to the fixed version is the recommended action.