Description
In FreeBSD 12.2-STABLE before r365772, 11.4-STABLE before r365773, 12.1-RELEASE before p10, 11.4-RELEASE before p4 and 11.3-RELEASE before p14 a ftpd(8) bug in the implementation of the file system sandbox, combined with capabilities available to an authenticated FTP user, can be used to escape the file system restriction configured in ftpchroot(5). Moreover, the bug allows a malicious client to gain root privileges.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-28594 | In FreeBSD 12.2-STABLE before r365772, 11.4-STABLE before r365773, 12.1-RELEASE before p10, 11.4-RELEASE before p4 and 11.3-RELEASE before p14 a ftpd(8) bug in the implementation of the file system sandbox, combined with capabilities available to an authenticated FTP user, can be used to escape the file system restriction configured in ftpchroot(5). Moreover, the bug allows a malicious client to gain root privileges. |
References
History
No history.
Status: PUBLISHED
Assigner: freebsd
Published:
Updated: 2024-08-04T09:33:19.881Z
Reserved: 2020-01-21T00:00:00.000Z
Link: CVE-2020-7468
No data.
Status : Modified
Published: 2021-03-26T21:15:13.380
Modified: 2024-11-21T05:37:12.290
Link: CVE-2020-7468
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD