First published: Thu Apr 15 2004(Updated: )
wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SGI ProPack | =2.3 | |
SGI ProPack | =2.4 | |
wu-ftpd | =2.4.1 | |
wu-ftpd | =2.4.2_beta2 | |
wu-ftpd | =2.4.2_beta18 | |
wu-ftpd | =2.4.2_beta18_vr4 | |
wu-ftpd | =2.4.2_beta18_vr5 | |
wu-ftpd | =2.4.2_beta18_vr6 | |
wu-ftpd | =2.4.2_beta18_vr7 | |
wu-ftpd | =2.4.2_beta18_vr8 | |
wu-ftpd | =2.4.2_beta18_vr9 | |
wu-ftpd | =2.4.2_beta18_vr10 | |
wu-ftpd | =2.4.2_beta18_vr11 | |
wu-ftpd | =2.4.2_beta18_vr12 | |
wu-ftpd | =2.4.2_beta18_vr13 | |
wu-ftpd | =2.4.2_beta18_vr14 | |
wu-ftpd | =2.4.2_beta18_vr15 | |
wu-ftpd | =2.4.2_vr16 | |
wu-ftpd | =2.4.2_vr17 | |
wu-ftpd | =2.5.0 | |
wu-ftpd | =2.6.0 | |
wu-ftpd | =2.6.1 | |
wu-ftpd | =2.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0148 has a moderate severity level, as it allows local users to bypass access restrictions.
To fix CVE-2004-0148, ensure that the restricted-gid option is configured correctly and limit permissions on user home directories as necessary.
Versions 2.6.2 and earlier of wu-ftpd are affected by CVE-2004-0148.
No, CVE-2004-0148 can only be exploited by local users who have access to the system.
CVE-2004-0148 compromises system security by allowing unauthorized users to access files outside their home directories.