CVE-2008-1668
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
ftpd.c in (1) wu-ftpd 2.4.2 and (2) ftpd in HP HP-UX B.11.11 assigns uid 0 to the FTP client in certain operating-system misconfigurations in which PAM authentication can succeed even though no passwd entry is available for a user, which allows remote attackers to gain privileges, as demonstrated by a login attempt for an LDAP account when nsswitch.conf does not specify LDAP for passwd information.
El archivo ftpd.c en (1) wu-ftpd versiones 2.4.2 y (2) ftpd en HP-UX de HP versión B.11.11, asigna uid 0 al cliente FTP en ciertas configuraciones erróneas del sistema operativo en las que la autenticación PAM puede tener éxito aunque no hay ninguna entrada de passwd disponible para un usuario, lo que permite a los atacantes remotos alcanzar privilegios, como es demostrado por un intento de inicio de sesión para una cuenta LDAP cuando nsswitch.conf no especifica LDAP para la información de passwd.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-04-03 CVE Reserved
- 2008-08-13 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-19 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2008/08/20/4 | Mailing List | |
http://www.securityfocus.com/bid/30666 | Vdb Entry | |
http://www.securitytracker.com/id?1020682 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/44414 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5971 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01525562 | 2017-09-29 | |
http://secunia.com/advisories/31471 | 2017-09-29 | |
http://www.vupen.com/english/advisories/2008/2364 | 2017-09-29 |