ftpd in Linux Netkit (linux-ftpd) 0.17, and possibly other versions, does not check the return status of certain seteuid, setgid, and setuid calls, which might allow remote authenticated users to gain privileges if these calls fail in cases such as PAM failures or resource limits, a different vulnerability than CVE-2006-5778.
References
Link | Resource |
---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384454 | Patch |
http://bugs.gentoo.org/show_bug.cgi?id=150292 | Patch |
http://ftp.debian.org/debian/pool/main/l/linux-ftpd/linux-ftpd_0.17-22.diff.gz | Patch |
http://secunia.com/advisories/22816 | Patch Vendor Advisory |
http://secunia.com/advisories/22853 | Patch Vendor Advisory |
http://www.gentoo.org/security/en/glsa/glsa-200611-05.xml | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2006-11-21 23:07
Updated : 2008-09-05 21:13
NVD link : CVE-2006-6008
Mitre link : CVE-2006-6008
CVE.ORG link : CVE-2006-6008
JSON object : View
Products Affected
netkit
- netkit
CWE