CVE-2006-7094
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
02/03/2007
Last modified:
09/04/2025
Description
ftpd, as used by Gentoo and Debian Linux, sets the gid to the effective uid instead of the effective group id before executing /bin/ls, which allows remote authenticated users to list arbitrary directories with the privileges of gid 0 and possibly enable additional attack vectors.
Impact
Base Score 2.0
8.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:* | ||
cpe:2.3:a:ftpd:ftpd:*:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:ftpd:ftpd:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/384454
- http://bugs.gentoo.org/show_bug.cgi?id=155317
- http://osvdb.org/34242
- http://packages.qa.debian.org/l/linux-ftpd/news/20061125T181702Z.html
- http://securityreason.com/securityalert/2330
- http://www.securityfocus.com/archive/1/460742/100/0/threaded
- http://bugs.debian.org/384454
- http://bugs.gentoo.org/show_bug.cgi?id=155317
- http://osvdb.org/34242
- http://packages.qa.debian.org/l/linux-ftpd/news/20061125T181702Z.html
- http://securityreason.com/securityalert/2330
- http://www.securityfocus.com/archive/1/460742/100/0/threaded