First published: Wed Jun 27 2001(Updated: )
postinst installation script for Proftpd in Debian 2.2 does not properly change the "run as uid/gid root" configuration when the user enables anonymous access, which causes the server to run at a higher privilege than intended.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Linux | =2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0456 is considered a high severity vulnerability due to the risk of privilege escalation.
To fix CVE-2001-0456, ensure that the ProFTPD installation script is properly configured to not run with root privileges when anonymous access is enabled.
CVE-2001-0456 affects Debian GNU/Linux version 2.2 specifically.
The implications of CVE-2001-0456 include the potential for unauthorized users to gain elevated privileges on the server.
Yes, a patch is available that addresses the privilege escalation issue in CVE-2001-0456.