Rapid7 Vulnerability & Exploit Database

RHSA-2003:020: Updated kerberos packages fix vulnerability in ftp client

Back to Search

RHSA-2003:020: Updated kerberos packages fix vulnerability in ftp client

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
02/19/2003
Created
07/25/2018
Added
10/28/2005
Modified
07/04/2017

Description

Updated packages fix a vulnerability found in the Kerberos ftp client distributed with the Red Hat Linux krb5 packages.

Kerberos is a network authentication system. A problem has been found in the Kerberos ftp client. When retrieving a file with a filename beginning with a pipe character, the ftp client will pass the filename to the command shell in a system() call. This could allow a malicious ftp server to write to files outside of the current directory or execute commands as the user running the ftp client. The Kerberos ftp client runs as the default ftp client when the Kerberos package krb5-workstation is installed on a Red Hat Linux distribution. All users of Kerberos are advised to upgrade to these errata packages which contain a backported patch and are not vulnerable to this issue.

Solution(s)

  • redhat-upgrade-krb5-configs
  • redhat-upgrade-krb5-devel
  • redhat-upgrade-krb5-libs
  • redhat-upgrade-krb5-server
  • redhat-upgrade-krb5-workstation

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;