Security restrictions bypass in Aconf



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2015-1419
CWE-ID CWE-284
Exploitation vector Network
Public exploit N/A
Vulnerable software
vsftpd (Alpine package)
Operating systems & Components / Operating system package or component


Other

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Security restrictions bypass

EUVDB-ID: #VU310

Risk: Low

CVSSv4.0: 0.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2015-1419

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to unknown error related to parsing of "deny_file" option. A remote authenticated attacker can bypass certain security restrictions and gain unauthorized access to protected files on the system.

Successful exploitation of the vulnerability may allow an authenticated attacker to bypass intended security restrictions.

Mitigation

Install update from vendor's website.

Vulnerable software versions

vsftpd (Alpine package): 2.2.2-r0 - 3.0.3-r5

: 0.4.0-r1

CPE2.3 External links

https://git.alpinelinux.org/aports/commit/?id=41ab224df12b8487004a1522b4f671680c082954
https://git.alpinelinux.org/aports/commit/?id=f0c7d3cb136b30eeeb61a518c2c36fdaab6f1cfa
https://git.alpinelinux.org/aports/commit/?id=6506b787b579ea013b396e70fab2d1b31d8e250b
https://git.alpinelinux.org/aports/commit/?id=6bf81f56e8c0b362d9c5ed046d9a8cdb81d5d957
https://git.alpinelinux.org/aports/commit/?id=6e8169c45ab42a30672742b08a22f18b5c643e72
https://git.alpinelinux.org/aports/commit/?id=877728e4b39efea18bee758d11611e6692584a63
https://git.alpinelinux.org/aports/commit/?id=0f34999f6985bddddfd91ed96461e855b8ac37cc
https://git.alpinelinux.org/aports/commit/?id=2d519469988edc19efb668e43421cf01addae1cd


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###