Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2011-0920

Опубликовано: 05 июл. 2011
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2011-0920: krb5-appl security update (IMPORTANT)

[1.0.1-2.1]

  • ftpd: add candidate patch to detect setegid/setregid/setresgid and check for errors when calling them (MITKRB5-SA-2011-005, CVE-2011-1526, #713341)

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

krb5-appl-clients

1.0.1-2.el6_1.1

krb5-appl-servers

1.0.1-2.el6_1.1

Oracle Linux i686

krb5-appl-clients

1.0.1-2.el6_1.1

krb5-appl-servers

1.0.1-2.el6_1.1

Связанные CVE

Связанные уязвимости

ubuntu
почти 14 лет назад

ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script.

redhat
почти 14 лет назад

ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script.

nvd
почти 14 лет назад

ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script.

debian
почти 14 лет назад

ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Application ...

github
около 3 лет назад

ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script.