Bug 453376 (CVE-2008-2375) - CVE-2008-2375 older vsftpd authentication memory leak
Summary: CVE-2008-2375 older vsftpd authentication memory leak
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2008-2375
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 197141 452630
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-06-30 08:41 UTC by Mark J. Cox
Modified: 2022-05-16 10:14 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2008-07-25 06:36:00 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2008:0579 0 normal SHIPPED_LIVE Moderate: vsftpd security update 2008-07-24 17:28:18 UTC
Red Hat Product Errata RHSA-2008:0680 0 normal SHIPPED_LIVE Moderate: vsftpd security and bug fix update 2008-07-24 16:38:54 UTC

Description Mark J. Cox 2008-06-30 08:41:34 UTC
Customers reported that the pre 2.0.5 versions of vsftpd as shipped in Red Hat
Enterprise Linux 3 and 4 when used in combination with PAM had a memory leak on
an invalid authentication attempt.  Since upstream vsftpd prior to 2.0.5 allows
any number of invalid attempts on the same connection this memory leak could
lead to an eventual DoS.  I've allocated this CVE-2008-2375.

Upstream vsftpd 2.0.5 changed its behaviour so that 3 (configurable) invalid
password attempts would close the connection (hence allowing easier detection of
brute forcing attacks etc), and this therefore also stops any memory leak from
leading to a DoS.  So we're going to add this backported patch to our older
vsftpd versions:                           
https://bugzilla.redhat.com/attachment.cgi?id=201051

No embargo on this, the CVE only applies to other distros that are supporting
vsftpd < 2.0.5 and have a memory leak.  We also didn't yet chase down the root
cause of the leak since it's mitigated by the patch.

Comment 1 Red Hat Product Security 2008-07-25 06:36:00 UTC
This issue was addressed in:

Red Hat Enterprise Linux:
  http://rhn.redhat.com/errata/RHSA-2008-0680.html
  http://rhn.redhat.com/errata/RHSA-2008-0579.html




Note You need to log in before you can comment on or make changes to this bug.