Vulnerability Description
ProFTPD before 1.3.5rc1, when using the UserOwner directive, allows local users to modify the ownership of arbitrary files via a race condition and a symlink attack on the (1) MKD or (2) XMKD commands.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Proftpd | Proftpd | <= 1.3.4 |
Related Weaknesses (CWE)
References
- http://bugs.proftpd.org/show_bug.cgi?id=3841
- http://proftpd.org/docs/NEWS-1.3.5rc1
- http://secunia.com/advisories/51823Vendor Advisory
- http://www.debian.org/security/2013/dsa-2606
- http://www.openwall.com/lists/oss-security/2013/01/07/3
- http://bugs.proftpd.org/show_bug.cgi?id=3841
- http://proftpd.org/docs/NEWS-1.3.5rc1
- http://secunia.com/advisories/51823Vendor Advisory
- http://www.debian.org/security/2013/dsa-2606
- http://www.openwall.com/lists/oss-security/2013/01/07/3
FAQ
What is CVE-2012-6095?
CVE-2012-6095 is a vulnerability with a CVSS score of 1.2 (LOW). ProFTPD before 1.3.5rc1, when using the UserOwner directive, allows local users to modify the ownership of arbitrary files via a race condition and a symlink attack on the (1) MKD or (2) XMKD commands...
How severe is CVE-2012-6095?
CVE-2012-6095 has been rated LOW with a CVSS base score of 1.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-6095?
Check the references section above for vendor advisories and patch information. Affected products include: Proftpd Proftpd.