vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.
References
Configurations
History
21 Nov 2024, 01:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/162145/vsftpd-2.3.4-Backdoor-Command-Execution.html - | |
References | () https://access.redhat.com/security/cve/cve-2011-2523 - Third Party Advisory | |
References | () https://packetstormsecurity.com/files/102745/VSFTPD-2.3.4-Backdoor-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://security-tracker.debian.org/tracker/CVE-2011-2523 - Third Party Advisory | |
References | () https://vigilance.fr/vulnerability/vsftpd-backdoor-in-version-2-3-4-10805 - Third Party Advisory | |
References | () https://www.openwall.com/lists/oss-security/2011/07/11/5 - Mailing List, Third Party Advisory |
Information
Published : 2019-11-27 21:15
Updated : 2024-11-21 01:28
NVD link : CVE-2011-2523
Mitre link : CVE-2011-2523
CVE.ORG link : CVE-2011-2523
JSON object : View
Products Affected
debian
- debian_linux
vsftpd_project
- vsftpd
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')