ftpd in Linux Netkit (linux-ftpd) 0.17, and possibly other versions, does not check the return status of certain seteuid, setgid, and setuid calls, which might allow remote authenticated users to gain privileges if these calls fail in cases such as PAM failures or resource limits, a different vulnerability than CVE-2006-5778.
References
Link | Resource |
---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384454 | Patch |
http://bugs.gentoo.org/show_bug.cgi?id=150292 | Patch |
http://ftp.debian.org/debian/pool/main/l/linux-ftpd/linux-ftpd_0.17-22.diff.gz | Patch |
http://secunia.com/advisories/22816 | Patch Vendor Advisory |
http://secunia.com/advisories/22853 | Patch Vendor Advisory |
http://www.gentoo.org/security/en/glsa/glsa-200611-05.xml | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:21:22
Updated: 2022-10-03T16:21:22
Reserved: 2022-10-03T00:00:00
Link: CVE-2006-6008
JSON object: View
NVD Information
Status : Analyzed
Published: 2006-11-21T23:07:00.000
Modified: 2008-09-05T21:13:39.197
Link: CVE-2006-6008
JSON object: View
Redhat Information
No data.
CWE