Dismissed
Permalink
CVE-2025-14242
6.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse dismissed
Vsftpd: vsftpd: denial of service via integer overflow in ls command parameter parsing
A flaw was found in vsftpd. This vulnerability allows a denial of service (DoS) via an integer overflow in the ls command parameter parsing, triggered by a remote, authenticated attacker sending a crafted STAT command with a specific byte sequence.
References
- RHSA-2026:0605 x_refsource_REDHAT vendor-advisory
- RHSA-2026:0606 x_refsource_REDHAT vendor-advisory
- RHSA-2026:0608 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-14242 x_refsource_REDHAT vdb-entry
- RHBZ#2419826 issue-tracking x_refsource_REDHAT
- RHSA-2026:0605 x_refsource_REDHAT vendor-advisory
- RHSA-2026:0606 x_refsource_REDHAT vendor-advisory
- RHSA-2026:0608 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-14242 x_refsource_REDHAT vdb-entry
- RHBZ#2419826 issue-tracking x_refsource_REDHAT
Affected products
vsftpd
- *
Package maintainers
-
@peterhoeg Peter Hoeg <peter@hoeg.com>