ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 01:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062681.html - Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062699.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00009.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00004.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00005.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00011.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00014.html - Mailing List, Third Party Advisory | |
References | () http://secunia.com/advisories/45145 - Third Party Advisory | |
References | () http://secunia.com/advisories/45157 - Third Party Advisory | |
References | () http://secunia.com/advisories/48101 - Third Party Advisory | |
References | () http://securityreason.com/securityalert/8301 - Third Party Advisory | |
References | () http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-005.txt - Patch, Vendor Advisory | |
References | () http://www.debian.org/security/2011/dsa-2283 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2011:117 - Third Party Advisory | |
References | () http://www.osvdb.org/73617 - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2011-0920.html - Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/518733/100/0/threaded - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/48571 - Patch, Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=711419 - Issue Tracking, Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/68398 - Third Party Advisory, VDB Entry |
Information
Published : 2011-07-11 20:55
Updated : 2024-11-21 01:26
NVD link : CVE-2011-1526
Mitre link : CVE-2011-1526
CVE.ORG link : CVE-2011-1526
JSON object : View
Products Affected
fedoraproject
- fedora
suse
- linux_enterprise_desktop
- linux_enterprise_server
- linux_enterprise_software_development_kit
mit
- krb5-appl
debian
- debian_linux
opensuse
- opensuse
CWE
CWE-269
Improper Privilege Management