First published: Tue Jun 07 2011(Updated: )
It was found that the kerberized FTP server did not properly check for the failure to set its effective group identifier (GID). A remote, authenticated FTP user could use this flaw to gain unauthorized read or write access to files whose group owner was the initial effective GID of the FTP daemon process. References: [1] <a href="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-005.txt">http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-005.txt</a> (not public yet) [2] <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1526">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1526</a> Upstream patch: [3] <a href="http://web.mit.edu/kerberos/advisories/2011-005-patch.txt">http://web.mit.edu/kerberos/advisories/2011-005-patch.txt</a> Acknowledgements: Red Hat would like to thank the MIT Kerberos project for reporting this issue. Upstream acknowledges Tim Zingelman as the original reporter.
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 Application |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-711419 is considered high due to the potential for unauthorized access to files.
To fix REDHAT-BUG-711419, apply the patches provided in the relevant advisories for MIT Kerberos.
Users of the kerberized FTP server in MIT Kerberos are affected by REDHAT-BUG-711419.
An attacker could exploit REDHAT-BUG-711419 to gain unauthorized read or write access to files owned by the initial effective GID of the FTP daemon.
REDHAT-BUG-711419 was identified in 2011.