First published: Tue Feb 02 2021(Updated: )
In the rcp client in MIT krb5-appl through 1.0.3, malicious servers could bypass intended access restrictions via the filename of . or an empty filename, similar to CVE-2018-20685 and CVE-2019-7282. The impact is modifying the permissions of the target directory on the client side. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT krb5-appl | <=1.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-25018.
The title of this vulnerability is 'In the rcp client in MIT krb5-appl through 1.0.3 malicious servers could bypass intended access restrictions.'
The severity level of CVE-2019-25018 is high, with a severity value of 7.5.
Malicious servers can bypass intended access restrictions in MIT krb5-appl through 1.0.3 by using the filename of '.' or an empty filename.
The impact of CVE-2019-25018 is modifying the permissions of the target directory on the client side.
For additional information about CVE-2019-25018, you can refer to the following link: https://bugzilla.suse.com/show_bug.cgi?id=1131109