First published: Wed Jan 28 2015(Updated: )
Unspecified vulnerability in vsftpd 3.0.2 and earlier allows remote attackers to bypass access restrictions via unknown vectors, related to deny_file parsing.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 | |
vsftpd | <=3.0.2 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
vsftpd | <=3.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-1419 is classified as high due to its ability to allow remote attackers to bypass access restrictions.
To fix CVE-2015-1419, you should upgrade vsftpd to version 3.0.3 or later, as these versions contain patches for the vulnerability.
CVE-2015-1419 affects vsftpd versions 3.0.2 and earlier.
Yes, CVE-2015-1419 can be exploited remotely by attackers to bypass access restrictions.
CVE-2015-1419 affects openSUSE versions 13.1 and 13.2, as well as any instance of vsftpd up to version 3.0.2.