MEDIUM · 6.5

CVE-2011-1526

ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypas...

Vulnerability Description

ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script.

CVSS Score

6.5

MEDIUM

AV:N/AC:L/Au:S/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
MitKrb5-Appl< 1.0.1
DebianDebian Linux5.0
FedoraprojectFedora14
OpensuseOpensuse11.3
SuseLinux Enterprise Desktop10
SuseLinux Enterprise Server10
SuseLinux Enterprise Software Development Kit10

Related Weaknesses (CWE)

References

FAQ

What is CVE-2011-1526?

CVE-2011-1526 is a vulnerability with a CVSS score of 6.5 (MEDIUM). ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypas...

How severe is CVE-2011-1526?

CVE-2011-1526 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2011-1526?

Check the references section above for vendor advisories and patch information. Affected products include: Mit Krb5-Appl, Debian Debian Linux, Fedoraproject Fedora, Opensuse Opensuse, Suse Linux Enterprise Desktop.