ftpd, as used by Gentoo and Debian Linux, sets the gid to the effective uid instead of the effective group id before executing /bin/ls, which allows remote authenticated users to list arbitrary directories with the privileges of gid 0 and possibly enable additional attack vectors.
References
Configurations
History
21 Nov 2024, 00:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/384454 - | |
References | () http://bugs.gentoo.org/show_bug.cgi?id=155317 - Patch | |
References | () http://osvdb.org/34242 - | |
References | () http://packages.qa.debian.org/l/linux-ftpd/news/20061125T181702Z.html - | |
References | () http://securityreason.com/securityalert/2330 - | |
References | () http://www.securityfocus.com/archive/1/460742/100/0/threaded - |
Information
Published : 2007-03-02 21:18
Updated : 2024-11-21 00:24
NVD link : CVE-2006-7094
Mitre link : CVE-2006-7094
CVE.ORG link : CVE-2006-7094
JSON object : View
Products Affected
gentoo
- linux
ftpd
- ftpd
debian
- debian_linux
CWE