{"vuid":"VU#118125","idnumber":"118125","name":"AIX FTP server may not properly timeout ephemeral data ports","keywords":["AIX","FTP server","timeout","passive data ports","LISTEN state","DoS","denial of service"],"overview":"The IBM AIX FTP server may be vulnerable to a denial-of-service condition when passive data ports are not closed properly.","clean_desc":"IBM AIX includes an FTP server, ftpd, which allows files to be transferred between hosts with the FTP protocol. This server is vulnerable to a condition where an attacker may be able to utilize all available ephemeral ports on the system. When the ephemeral port range is exhausted, no more ports are available for the system to use for an indefinite period of time, resulting in a system-wide network-based denial of service. Additionally, the memory usage caused by the sockets in use by ftpd may also create a local denial of service condition by limiting system resources available to other processes. AIX 5.1, 5.2, and 5.3 are affected.","impact":"A remote, authenticated user may be able to limit system and network resources and cause a denial-of-service condition. If anonymous FTP access is allowed, anonymous users are considered to be authenticated and may cause the same denial-of-service conditions.","resolution":"Apply An Update Please contact IBM or your vendor for information on resolutions, workarounds, updates, and fixes.","workarounds":"","sysaffected":"","thanks":"Thanks to Matt Mello and IBM for reporting this vulnerability.","author":"This document was written by Ken MacInnis.","public":["http://www-1.ibm.com/servers/aix/","http://www.faqs.org/rfcs/rfc959.html","http://www.faqs.org/rfcs/rfc1579.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-05-02T14:50:59Z","publicdate":"2005-07-07T00:00:00Z","datefirstpublished":"2005-07-07T19:37:35Z","dateupdated":"2005-07-07T20:08:53Z","revision":8,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"13","cam_exploitation":"0","cam_internetinfrastructure":"8","cam_population":"15","cam_impact":"3","cam_easeofexploitation":"10","cam_attackeraccessrequired":"10","cam_scorecurrent":"1.771875","cam_scorecurrentwidelyknown":"2.3625","cam_scorecurrentwidelyknownexploited":"4.05","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.771875,"vulnote":null}