Описание
ftpd, as used by Gentoo and Debian Linux, sets the gid to the effective uid instead of the effective group id before executing /bin/ls, which allows remote authenticated users to list arbitrary directories with the privileges of gid 0 and possibly enable additional attack vectors.
ftpd, as used by Gentoo and Debian Linux, sets the gid to the effective uid instead of the effective group id before executing /bin/ls, which allows remote authenticated users to list arbitrary directories with the privileges of gid 0 and possibly enable additional attack vectors.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-7094
- http://bugs.debian.org/384454
- http://bugs.gentoo.org/show_bug.cgi?id=155317
- http://osvdb.org/34242
- http://packages.qa.debian.org/l/linux-ftpd/news/20061125T181702Z.html
- http://securityreason.com/securityalert/2330
- http://www.securityfocus.com/archive/1/460742/100/0/threaded
EPSS
CVE ID
Связанные уязвимости
ftpd, as used by Gentoo and Debian Linux, sets the gid to the effective uid instead of the effective group id before executing /bin/ls, which allows remote authenticated users to list arbitrary directories with the privileges of gid 0 and possibly enable additional attack vectors.
ftpd, as used by Gentoo and Debian Linux, sets the gid to the effective uid instead of the effective group id before executing /bin/ls, which allows remote authenticated users to list arbitrary directories with the privileges of gid 0 and possibly enable additional attack vectors.
ftpd, as used by Gentoo and Debian Linux, sets the gid to the effectiv ...
EPSS