FreeBSD : wu-ftpd ftpaccess `restricted-uid'/`restricted-gid' directive may be bypassed (3b7c7f6c-7102-11d8-873f-0020ed76ef5a)

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Glenn Stewart reports a bug in wu-ftpd's ftpaccess
`restricted-uid'/`restricted-gid' directives :

Users can get around the restriction to their home directory by
issuing a simple chmod command on their home directory. On the next
ftp log in, the user will have '/' as their root directory.

Matt Zimmerman discovered that the cause of the bug was a missing
check for a restricted user within a code path that is executed only
when a certain error is encountered.

See also :

http://www.nessus.org/u?d82141ba

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.3
(CVSS2#E:H/RL:OF/RC:C)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 37480 (freebsd_pkg_3b7c7f6c710211d8873f0020ed76ef5a.nasl)

Bugtraq ID: 9832

CVE ID: CVE-2004-0148

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now