The httpd package in fli4l before 3.10.1 and 4.0 before 2015-01-30 allows remote attackers to execute arbitrary code.
References
Link | Resource |
---|---|
http://seclists.org/oss-sec/2015/q1/376 | Mailing List Third Party Advisory |
http://www.fli4l.de/fileadmin/fli4l/security/advisory-FFL-1113.txt | Mitigation Vendor Advisory |
http://www.openwall.com/lists/oss-security/2015/02/01/5 | Mailing List Third Party Advisory |
http://seclists.org/oss-sec/2015/q1/376 | Mailing List Third Party Advisory |
http://www.fli4l.de/fileadmin/fli4l/security/advisory-FFL-1113.txt | Mitigation Vendor Advisory |
http://www.openwall.com/lists/oss-security/2015/02/01/5 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/oss-sec/2015/q1/376 - Mailing List, Third Party Advisory | |
References | () http://www.fli4l.de/fileadmin/fli4l/security/advisory-FFL-1113.txt - Mitigation, Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/02/01/5 - Mailing List, Third Party Advisory |
Information
Published : 2017-08-28 15:29
Updated : 2024-11-21 02:25
NVD link : CVE-2015-1443
Mitre link : CVE-2015-1443
CVE.ORG link : CVE-2015-1443
JSON object : View
Products Affected
fli4l
- fli4l
CWE
CWE-20
Improper Input Validation