First published: Tue Apr 05 2016(Updated: )
The mod_tls module in ProFTPD before 1.3.5b and 1.3.6 before 1.3.6rc2 does not properly handle the TLSDHParamFile directive, which might cause a weaker than intended Diffie-Hellman (DH) key to be used and consequently allow attackers to have unspecified impact via unknown vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ProFTPD | <=1.3.5 | |
ProFTPD | =1.3.6-rc1 | |
SUSE Linux | =13.1 | |
Fedora | =22 | |
Fedora | =23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3125 has been classified as a medium-severity vulnerability due to potential weaknesses in the Diffie-Hellman key generation.
To fix CVE-2016-3125, you should upgrade to ProFTPD version 1.3.6rc2 or later.
CVE-2016-3125 affects ProFTPD versions earlier than 1.3.5b and 1.3.6 before 1.3.6rc2.
CVE-2016-3125 could potentially allow attackers to exploit weaker than intended keys used in the TLS handshake.
Yes, CVE-2016-3125 affects various operating systems including openSUSE 13.1 and Fedora versions 22 and 23.