Rapid7 Vulnerability & Exploit Database

SUSE Linux Security Vulnerability: CVE-2011-1526

Back to Search

SUSE Linux Security Vulnerability: CVE-2011-1526

Severity
7
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
Published
07/11/2011
Created
07/25/2018
Added
02/17/2015
Modified
07/04/2017

Description

ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script.

Solution(s)

  • suse-upgrade-krb5
  • suse-upgrade-krb5-32bit
  • suse-upgrade-krb5-64bit
  • suse-upgrade-krb5-appl-clients
  • suse-upgrade-krb5-appl-servers
  • suse-upgrade-krb5-apps-clients
  • suse-upgrade-krb5-apps-servers
  • suse-upgrade-krb5-client
  • suse-upgrade-krb5-devel
  • suse-upgrade-krb5-devel-32bit
  • suse-upgrade-krb5-devel-64bit
  • suse-upgrade-krb5-plugin-kdb-ldap
  • suse-upgrade-krb5-plugin-preauth-pkinit
  • suse-upgrade-krb5-server
  • suse-upgrade-krb5-x86

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;