ID CVE-2011-0988 Type cve Reporter NVD Modified 2017-08-16T21:33:45
Description
pure-ftpd 1.0.22, as used in SUSE Linux Enterprise Server 10 SP3 and SP4, and Enterprise Desktop 10 SP3 and SP4, when running OES Netware extensions, creates a world-writeable directory, which allows local users to overwrite arbitrary files and gain privileges via unspecified vectors.
{"id": "CVE-2011-0988", "bulletinFamily": "NVD", "title": "CVE-2011-0988", "description": "pure-ftpd 1.0.22, as used in SUSE Linux Enterprise Server 10 SP3 and SP4, and Enterprise Desktop 10 SP3 and SP4, when running OES Netware extensions, creates a world-writeable directory, which allows local users to overwrite arbitrary files and gain privileges via unspecified vectors.", "published": "2011-04-18T13:55:01", "modified": "2017-08-16T21:33:45", "cvss": {"score": 4.4, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0988", "reporter": "NVD", "references": ["https://hermes.opensuse.org/messages/7849430", "https://exchange.xforce.ibmcloud.com/vulnerabilities/66618"], "cvelist": ["CVE-2011-0988"], "type": "cve", "lastseen": "2017-08-17T10:42:42", "history": [{"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/o:novell:suse_linux:11:sp3:desktop", "cpe:/o:novell:suse_linux:10:sp3", "cpe:/o:novell:suse_linux:10:sp4", "cpe:/a:pureftpd:pure-ftpd:1.0.22", "cpe:/o:novell:suse_linux:11:sp4:desktop"], "cvelist": ["CVE-2011-0988"], "cvss": {"score": 4.4, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "description": "pure-ftpd 1.0.22, as used in SUSE Linux Enterprise Server 10 SP3 and SP4, and Enterprise Desktop 10 SP3 and SP4, when running OES Netware extensions, creates a world-writeable directory, which allows local users to overwrite arbitrary files and gain privileges via unspecified vectors.", "edition": 1, "enchantments": {}, "hash": "8920cfce2a1344ab1a8344d9775b376d2163749db8907d62cdc8cdb0ba961c47", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "b5663802287f7a831112ee8dec0147a2", "key": "cvss"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "3648d495687a040756a3d2efc8ff7605", "key": "cpe"}, {"hash": "3eeeb6fd25783b77f3b056e0df8676ef", "key": "description"}, {"hash": "b7d95747d780180963efa1c940f53d5c", "key": "href"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "726636f3a29937e7283d431d3d541edd", "key": "references"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "dd3640e90a91514a988f7f42eee7640a", "key": "modified"}, {"hash": "b847abb72d9026b9f33ba48ad7b9d000", "key": "cvelist"}, {"hash": "a93bb773d8f85ae2552f07889b6b43bc", "key": "published"}, {"hash": "49b2cbcbd61b80f5484e1349817c12d7", "key": "title"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0988", "id": "CVE-2011-0988", "lastseen": "2016-09-03T15:06:10", "modified": "2011-04-18T00:00:00", "objectVersion": "1.2", "published": "2011-04-18T13:55:01", "references": ["https://hermes.opensuse.org/messages/7849430", "http://xforce.iss.net/xforce/xfdb/66618"], "reporter": "NVD", "scanner": [], "title": "CVE-2011-0988", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 1, "lastseen": "2016-09-03T15:06:10"}], "edition": 2, "hashmap": [{"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "3648d495687a040756a3d2efc8ff7605"}, {"key": "cvelist", "hash": "b847abb72d9026b9f33ba48ad7b9d000"}, {"key": "cvss", "hash": "b5663802287f7a831112ee8dec0147a2"}, {"key": "description", "hash": "3eeeb6fd25783b77f3b056e0df8676ef"}, {"key": "href", "hash": "b7d95747d780180963efa1c940f53d5c"}, {"key": "modified", "hash": "3922039733d59f5e4ecd758712591bf5"}, {"key": "published", "hash": "a93bb773d8f85ae2552f07889b6b43bc"}, {"key": "references", "hash": "7bc9c4a23de33b65a94eac5bdaf6793d"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "49b2cbcbd61b80f5484e1349817c12d7"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "3a277b0319ea9a9c1ebb6bc10431816effa03e6ae70c60826789a52bc1d774a3", "viewCount": 1, "enchantments": {"score": {"value": 7.2, "vector": "NONE", "modified": "2017-08-17T10:42:42"}, "dependencies": {"references": [{"type": "nessus", "idList": ["SUSE_PURE-FTPD-7428.NASL", "SUSE_PURE-FTPD-7426.NASL"]}], "modified": "2017-08-17T10:42:42"}, "vulnersScore": 7.2}, "objectVersion": "1.3", "cpe": ["cpe:/o:novell:suse_linux:11:sp3:desktop", "cpe:/o:novell:suse_linux:10:sp3", "cpe:/o:novell:suse_linux:10:sp4", "cpe:/a:pureftpd:pure-ftpd:1.0.22", "cpe:/o:novell:suse_linux:11:sp4:desktop"], "assessment": {"href": "", "name": "", "system": ""}, "scanner": []}
{"nessus": [{"lastseen": "2019-01-16T20:11:57", "bulletinFamily": "scanner", "description": "pure-ftpd was updated to fix a security issue with an Open Enterprise\nServer specific patch :\n\n - A worldwriteable directory created and used by the OES\n pure-ftpd Netware extensions could be used by local\n attackers to overwrite system files and so gain\n privileges. (CVE-2011-0988)", "modified": "2012-05-17T00:00:00", "published": "2011-04-07T00:00:00", "id": "SUSE_PURE-FTPD-7428.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=53318", "title": "SuSE 10 Security Update : pure-ftpd (ZYPP Patch Number 7428)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(53318);\n script_version (\"$Revision: 1.5 $\");\n script_cvs_date(\"$Date: 2012/05/17 11:20:15 $\");\n\n script_cve_id(\"CVE-2011-0988\");\n\n script_name(english:\"SuSE 10 Security Update : pure-ftpd (ZYPP Patch Number 7428)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"pure-ftpd was updated to fix a security issue with an Open Enterprise\nServer specific patch :\n\n - A worldwriteable directory created and used by the OES\n pure-ftpd Netware extensions could be used by local\n attackers to overwrite system files and so gain\n privileges. (CVE-2011-0988)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2011-0988.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 7428.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/03/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/04/07\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2012 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:3, reference:\"pure-ftpd-1.0.22-0.18.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:3, reference:\"pure-ftpd-1.0.22-0.18.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 4.4, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-01-16T20:12:54", "bulletinFamily": "scanner", "description": "pure-ftpd was updated to fix a security issue with an Open Enterprise\nServer specific patch :\n\n - A worldwriteable directory created and used by the OES\n pure-ftpd Netware extensions could be used by local\n attackers to overwrite system files and so gain\n privileges. (CVE-2011-0988)", "modified": "2012-05-17T00:00:00", "published": "2011-12-13T00:00:00", "id": "SUSE_PURE-FTPD-7426.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=57245", "title": "SuSE 10 Security Update : pure-ftpd (ZYPP Patch Number 7426)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(57245);\n script_version (\"$Revision: 1.2 $\");\n script_cvs_date(\"$Date: 2012/05/17 11:20:15 $\");\n\n script_cve_id(\"CVE-2011-0988\");\n\n script_name(english:\"SuSE 10 Security Update : pure-ftpd (ZYPP Patch Number 7426)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"pure-ftpd was updated to fix a security issue with an Open Enterprise\nServer specific patch :\n\n - A worldwriteable directory created and used by the OES\n pure-ftpd Netware extensions could be used by local\n attackers to overwrite system files and so gain\n privileges. (CVE-2011-0988)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2011-0988.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 7426.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/03/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/12/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2012 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:4, reference:\"pure-ftpd-1.0.22-0.18.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:4, reference:\"pure-ftpd-1.0.22-0.18.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 4.4, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}