First published: Wed Feb 28 2007(Updated: )
ftpd, as used by Gentoo and Debian Linux, sets the gid to the effective uid instead of the effective group id before executing /bin/ls, which allows remote authenticated users to list arbitrary directories with the privileges of gid 0 and possibly enable additional attack vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gentoo Linux | ||
Foreman | ||
Debian | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-7094 is classified as a high severity vulnerability because it allows remote authenticated users to list arbitrary directories with elevated privileges.
To mitigate CVE-2006-7094, it is recommended to upgrade to a patched version of the ftpd software.
CVE-2006-7094 affects ftpd as implemented in Debian Linux 4.0 and Gentoo Linux.
CVE-2006-7094 can compromise system security by enabling unauthorized access to sensitive directory listings and escalating privileges.
CVE-2006-7094 can be exploited by any remote authenticated user with access to the ftpd service.