FreeBSD : wu-ftpd ftpaccess `restricted-uid'/`restricted-gid' directive may be bypassed (3b7c7f6c-7102-11d8-873f-0020ed76ef5a)

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing one or more security-related

Description :

Glenn Stewart reports a bug in wu-ftpd's ftpaccess
`restricted-uid'/`restricted-gid' directives :

Users can get around the restriction to their home directory by
issuing a simple chmod command on their home directory. On the next
ftp log in, the user will have '/' as their root directory.

Matt Zimmerman discovered that the cause of the bug was a missing
check for a restricted user within a code path that is executed only
when a certain error is encountered.

See also :

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.2
CVSS Temporal Score : 6.3
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 37480 (freebsd_pkg_3b7c7f6c710211d8873f0020ed76ef5a.nasl)

Bugtraq ID: 9832

CVE ID: CVE-2004-0148

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now