This Metasploit module triggers a Denial of Service condition in the VSFTPD server in versions before 2.3.3. So far, it has been tested on 2.3.0, 2.3.1, and 2.3.2.
b641640adf9148a4f15ae3506355045a3a47f8aa883622b9a9d85371e48cb171
HP Security Bulletin HPSBMU02752 SSRT100802 - Potential security vulnerabilities have been identified with HP Insight Control Software for Linux (IC-Linux). The vulnerabilities could be exploited remotely to execute arbitrary code or to create a Denial of Service (DoS). Revision 1 of this advisory.
30bc52b92fd916034415c3776af5aa318ac48908a3cb84ed86e9a8ce99bb8554
Gentoo Linux Security Advisory 201110-7 - A denial of service vulnerability was found in vsftpd. Versions less than 2.3.4 are affected.
25e59b0d3d80cebbf1b5e0c8e00ef3aada01999dfcefc483d69463a203f3e7f6
Debian Linux Security Advisory 2305-1 - Two security issue have been discovered that affect vsftpd, a lightweight, efficient FTP server written for security.
d1013c9209e9503db4e32189f1ad82768a403b81814dbf62efc924b7a59799f6
Ubuntu Security Notice 1098-1 - It was discovered that vsftpd incorrectly handled certain glob expressions. A remote authenticated user could use a crafted glob expression to cause vftpd to consume all resources, leading to a denial of service.
069ed5ee94ecf7be1a9e9660c508d1df643b11ee2a9f85007c94090cdd00fb32
Mandriva Linux Security Advisory 2011-049 - The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632.
c08705321456654fe5a1918b154688cec58d91991fae2c1710c2faa6478ac2cb
Vsftpd version 2.3.2 proof of concept denial of service exploit.
97bc1d3ccc743031a4f8c24295844c75945d7dc113934134a417a91e26c8a749
Vsftpd versions 2.3.2 on NetBSD and 2.3.0 on Ubuntu suffer from a remote denial of service vulnerability.
582c1d1692bc5d0b1eb73bec75e387f99e33527b0bb2b8270799c9b544858506