Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2011-1526


ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script.


Published

2011-07-11T20:55:01.067

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.5 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-269

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application mit krb5-appl < 1.0.1 Yes
Operating System debian debian_linux 5.0 Yes
Operating System debian debian_linux 6.0 Yes
Operating System fedoraproject fedora 14 Yes
Operating System fedoraproject fedora 15 Yes
Operating System opensuse opensuse 11.3 Yes
Operating System opensuse opensuse 11.4 Yes
Operating System suse linux_enterprise_desktop 10 Yes
Operating System suse linux_enterprise_desktop 11 Yes
Operating System suse linux_enterprise_server 10 Yes
Operating System suse linux_enterprise_server 10 Yes
Operating System suse linux_enterprise_server 10 Yes
Operating System suse linux_enterprise_server 11 Yes
Operating System suse linux_enterprise_server 11 Yes
Operating System suse linux_enterprise_software_development_kit 10 Yes
Operating System suse linux_enterprise_software_development_kit 11 Yes

References