Pure-FTPd: Potential DoS when maximum connections is reached
Gentoo Linux Security Advisory
||GLSA 200407-04 / Pure-FTPd
||July 04, 2004
||May 22, 2006: 02
All supported architectures
Pure-FTPd contains a bug potentially allowing a Denial of Service attack
when the maximum number of connections is reached.
Pure-FTPd is a fast, production-quality and standards-compliant FTP
Pure-FTPd contains a bug in the accept_client function handling the
setup of new connections.
When the maximum number of connections is reached an attacker could
exploit this vulnerability to perform a Denial of Service attack.
There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version.
All Pure-FTPd users should upgrade to the latest stable version:
Code Listing 3.1: Resolution
# emerge sync
# emerge -pv ">=net-ftp/pure-ftpd-1.0.18-r1"
# emerge ">=net-ftp/pure-ftpd-1.0.18-r1"