ftpd in Linux Netkit (linux-ftpd) 0.17, and possibly other versions, does not check the return status of certain seteuid, setgid, and setuid calls, which might allow remote authenticated users to gain privileges if these calls fail in cases such as PAM failures or resource limits, a different vulnerability than CVE-2006-5778.
References
Link | Resource |
---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384454 | Patch |
http://bugs.gentoo.org/show_bug.cgi?id=150292 | Patch |
http://ftp.debian.org/debian/pool/main/l/linux-ftpd/linux-ftpd_0.17-22.diff.gz | Patch |
http://www.gentoo.org/security/en/glsa/glsa-200611-05.xml | Patch Vendor Advisory |
http://secunia.com/advisories/22816 | Patch Vendor Advisory |
http://secunia.com/advisories/22853 | Patch Vendor Advisory |
Configurations
Information
Published : 2006-11-21 15:07
Updated : 2008-09-05 14:13
NVD link : CVE-2006-6008
Mitre link : CVE-2006-6008
JSON object : View
CWE
Products Affected
netkit
- netkit