CVE-2006-7094 Details

CVE-2006-7094

Published: 2007-03-02
Last Modified: 2018-10-16
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

ftpd, as used by Gentoo and Debian Linux, sets the gid to the effective uid instead of the effective group id before executing /bin/ls, which allows remote authenticated users to list arbitrary directories with the privileges of gid 0 and possibly enable additional attack vectors.

Analysis
Common Vulnerability Score System v2.0
Severity High
Base Score 8.5/10
Exploit Score 6.8/10
Access Vector Network
Access Complexity Medium
Authentication Single
Impact Score 10/10
Confidentiality Impact Complete
Availability Impact Complete
Integrity Impact Complete
Vector String AV:N/AC:M/Au:S/C:C/I:C/A:C
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:* No - -
cpe:2.3:a:ftpd:ftpd:*:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* No - -
cpe:2.3:a:ftpd:ftpd:*:*:*:*:*:*:*:* Yes - -
References

http://bugs.debian.org/384454
http://bugs.gentoo.org/show_bug.cgi?id=155317
http://osvdb.org/34242
http://packages.qa.debian.org/l/linux-ftpd/news/20061125T181702Z.html
http://securityreason.com/securityalert/2330
http://www.securityfocus.com/archive/1/460742/100/0/threaded

CVE ID
CVE-2006-7094
Published
2007-03-02
Modified
2018-10-16
CVSSv2.0
High
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE Pending

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.