Check Point Reference: | CPAI-2015-0458 |
Date Published: | 6 Apr 2015 |
Severity: | Critical |
Last Updated: | Tuesday 05 May, 2015 |
Source: | |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | VSFTPD v2.3.4 |
Vulnerability Description | An attacker might use a malicious backdoor that was added to the VSFTPD download archive. A successful exploitation might allow the attacker to run arbitrary code, or use the server as a bot for further attacks. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: FTP Enforcement Violation.
Attack Information: VSFTPD Invalid User Name Code Execution