ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 01:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062681.html - Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062699.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00009.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00004.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00005.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00011.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00014.html - Mailing List, Third Party Advisory | |
References | () http://secunia.com/advisories/45145 - Third Party Advisory | |
References | () http://secunia.com/advisories/45157 - Third Party Advisory | |
References | () http://secunia.com/advisories/48101 - Third Party Advisory | |
References | () http://securityreason.com/securityalert/8301 - Third Party Advisory | |
References | () http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-005.txt - Patch, Vendor Advisory | |
References | () http://www.debian.org/security/2011/dsa-2283 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2011:117 - Third Party Advisory | |
References | () http://www.osvdb.org/73617 - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2011-0920.html - Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/518733/100/0/threaded - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/48571 - Patch, Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=711419 - Issue Tracking, Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/68398 - Third Party Advisory, VDB Entry |
Information
Published : 2011-07-11 20:55
Updated : 2024-11-21 01:26
NVD link : CVE-2011-1526
Mitre link : CVE-2011-1526
CVE.ORG link : CVE-2011-1526
JSON object : View
Products Affected
opensuse
- opensuse
suse
- linux_enterprise_software_development_kit
- linux_enterprise_server
- linux_enterprise_desktop
mit
- krb5-appl
debian
- debian_linux
fedoraproject
- fedora
CWE
CWE-269
Improper Privilege Management