Vulnerability Description
ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mit | Krb5-Appl | < 1.0.1 |
| Debian | Debian Linux | 5.0 |
| Fedoraproject | Fedora | 14 |
| Opensuse | Opensuse | 11.3 |
| Suse | Linux Enterprise Desktop | 10 |
| Suse | Linux Enterprise Server | 10 |
| Suse | Linux Enterprise Software Development Kit | 10 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062681.htmlThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062699.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00009.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00004.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00005.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00011.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00014.htmlMailing ListThird Party Advisory
- http://secunia.com/advisories/45145Third Party Advisory
- http://secunia.com/advisories/45157Third Party Advisory
- http://secunia.com/advisories/48101Third Party Advisory
- http://securityreason.com/securityalert/8301Third Party Advisory
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-005.txtPatchVendor Advisory
- http://www.debian.org/security/2011/dsa-2283Third Party Advisory
FAQ
What is CVE-2011-1526?
CVE-2011-1526 is a vulnerability with a CVSS score of 6.5 (MEDIUM). ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypas...
How severe is CVE-2011-1526?
CVE-2011-1526 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-1526?
Check the references section above for vendor advisories and patch information. Affected products include: Mit Krb5-Appl, Debian Debian Linux, Fedoraproject Fedora, Opensuse Opensuse, Suse Linux Enterprise Desktop.