CVE-2006-6008
Summary
| CVE | CVE-2006-6008 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-11-21 23:07:00 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | ftpd in Linux Netkit (linux-ftpd) 0.17, and possibly other versions, does not check the return status of certain seteuid, setgid, and setuid calls, which might allow remote authenticated users to gain privileges if these calls fail in cases such as PAM failures or resource limits, a different vulnerability than CVE-2006-5778. |
Risk And Classification
Primary CVSS: v2.0 6.5 from [email protected]
AV:N/AC:L/Au:S/C:P/I:P/A:P
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
SingleConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:L/Au:S/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Gentoo Bug 150292 - net-ftp/ftpd - incorrect seteuid call makes it possible to access others files | af854a3a-2127-422b-91ae-364da2661108 | bugs.gentoo.org | Patch |
| #384454 - ftpd: Does not handle symlink? NFS? home directory - Debian Bug report logs | af854a3a-2127-422b-91ae-364da2661108 | bugs.debian.org | Patch |
| 404 Not Found | af854a3a-2127-422b-91ae-364da2661108 | ftp.debian.org | Patch |
| Linux NetKit FTP Server Information Disclosure and Privilege Escalation - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Patch, Vendor Advisory |
| Gentoo Linux Documentation -- Netkit FTP Server: Privilege escalation | af854a3a-2127-422b-91ae-364da2661108 | www.gentoo.org | Patch, Vendor Advisory |
| Gentoo update for ftpd - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Patch, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.