Bug 37731

Summary: krb5 ftpd buffer overflows
Product: [Retired] Red Hat Linux Reporter: Daniel Roesen <dr>
Component: krb5Assignee: Nalin Dahyabhai <nalin>
Status: CLOSED DUPLICATE QA Contact: Brian Brock <bbrock>
Severity: medium Docs Contact:
Priority: high    
Version: 7.1Keywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2001-04-26 19:52:37 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Daniel Roesen 2001-04-26 06:15:13 UTC
From BugTraq posting:

* If anonymous FTP is enabled, a remote user may gain unauthorized
  root access.

* A user with access to a local account may gain unauthorized root
  access.

* A remote user who can successfully authenticate to the FTP daemon
  may obtain unauthorized root access, regardless of whether anonymous
  FTP is enabled or whether access is granted to a local account.
  This vulnerability is believed to be somewhat difficult to exploit.

This announcement and code patches related to it may be found on the
MIT Kerberos security advisory page at:

        http://web.mit.edu/kerberos/www/advisories/index.html

Comment 1 Nalin Dahyabhai 2001-04-26 19:54:29 UTC

*** This bug has been marked as a duplicate of 35978 ***