Lucene search

K
cve[email protected]CVE-2011-1526
HistoryJul 11, 2011 - 8:55 p.m.

CVE-2011-1526

2011-07-1120:55:01
CWE-269
web.nvd.nist.gov
35
2
cve-2011-1526
mit kerberos
ftp daemon
krb5-appl
group access restrictions
ftp commands

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

4.6 Medium

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

72.0%

ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script.

Affected configurations

NVD
Node
mitkrb5-applRange<1.0.1
Node
debiandebian_linuxMatch5.0
OR
debiandebian_linuxMatch6.0
Node
fedoraprojectfedoraMatch14
OR
fedoraprojectfedoraMatch15
Node
opensuseopensuseMatch11.3
OR
opensuseopensuseMatch11.4
OR
suselinux_enterprise_desktopMatch10sp4-
OR
suselinux_enterprise_desktopMatch11sp1
OR
suselinux_enterprise_serverMatch10sp2
OR
suselinux_enterprise_serverMatch10sp3ltss
OR
suselinux_enterprise_serverMatch10sp4-
OR
suselinux_enterprise_serverMatch11sp1-
OR
suselinux_enterprise_serverMatch11sp1-vmware
OR
suselinux_enterprise_software_development_kitMatch10sp4
OR
suselinux_enterprise_software_development_kitMatch11sp1
CPENameOperatorVersion
mit:krb5-applmit krb5-appllt1.0.1

References

Social References

More

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

4.6 Medium

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

72.0%