CVE-2025-14242 PUBLISHED

Vsftpd: vsftpd: denial of service via integer overflow in ls command parameter parsing

Assigner: redhat
Reserved: 08.12.2025 Published: 14.01.2026 Updated: 16.03.2026

A flaw was found in vsftpd. This vulnerability allows a denial of service (DoS) via an integer overflow in the ls command parameter parsing, triggered by a remote, authenticated attacker sending a crafted STAT command with a specific byte sequence.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS Score: 6.5

Product Status

Vendor Red Hat
Product Red Hat Enterprise Linux 10
Versions Default: affected
  • unaffected from 0:3.0.5-10.el10_1.1 to * (excl.)
Vendor Red Hat
Product Red Hat Enterprise Linux 10.0 Extended Update Support
Versions Default: affected
  • unaffected from 0:3.0.5-9.el10_0.1 to * (excl.)
Vendor Red Hat
Product Red Hat Enterprise Linux 8
Versions Default: affected
  • unaffected from 0:3.0.3-36.el8_10.3 to * (excl.)
Vendor Red Hat
Product Red Hat Enterprise Linux 8.2 Advanced Update Support
Versions Default: affected
  • unaffected from 0:3.0.3-31.el8_2.1 to * (excl.)
Vendor Red Hat
Product Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
Versions Default: affected
  • unaffected from 0:3.0.3-33.el8_4.1 to * (excl.)
Vendor Red Hat
Product Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On
Versions Default: affected
  • unaffected from 0:3.0.3-33.el8_4.1 to * (excl.)
Vendor Red Hat
Product Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
Versions Default: affected
  • unaffected from 0:3.0.3-35.el8_6.1 to * (excl.)
Vendor Red Hat
Product Red Hat Enterprise Linux 8.6 Telecommunications Update Service
Versions Default: affected
  • unaffected from 0:3.0.3-35.el8_6.1 to * (excl.)
Vendor Red Hat
Product Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
Versions Default: affected
  • unaffected from 0:3.0.3-35.el8_6.1 to * (excl.)
Vendor Red Hat
Product Red Hat Enterprise Linux 8.8 Telecommunications Update Service
Versions Default: affected
  • unaffected from 0:3.0.3-35.el8_8.1 to * (excl.)
Vendor Red Hat
Product Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
Versions Default: affected
  • unaffected from 0:3.0.3-35.el8_8.1 to * (excl.)
Vendor Red Hat
Product Red Hat Enterprise Linux 9
Versions Default: affected
  • unaffected from 0:3.0.5-6.el9_7.2 to * (excl.)
Vendor Red Hat
Product Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
Versions Default: affected
  • unaffected from 0:3.0.3-49.el9_0.1 to * (excl.)
Vendor Red Hat
Product Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions
Versions Default: affected
  • unaffected from 0:3.0.5-4.el9_2.1 to * (excl.)
Vendor Red Hat
Product Red Hat Enterprise Linux 9.4 Extended Update Support
Versions Default: affected
  • unaffected from 0:3.0.5-5.el9_4.1 to * (excl.)
Vendor Red Hat
Product Red Hat Enterprise Linux 9.6 Extended Update Support
Versions Default: affected
  • unaffected from 0:3.0.5-6.el9_6.1 to * (excl.)
Vendor Red Hat
Product Red Hat Enterprise Linux 6
Versions Default: unknown
Vendor Red Hat
Product Red Hat Enterprise Linux 7
Versions Default: unknown

Workarounds

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Credits

  • Red Hat would like to thank Sankin Nikita Alexeevich for reporting this issue.

References

Problem Types

  • Integer Overflow or Wraparound CWE