In FreeBSD 12.2-STABLE before r365772, 11.4-STABLE before r365773, 12.1-RELEASE before p10, 11.4-RELEASE before p4 and 11.3-RELEASE before p14 a ftpd(8) bug in the implementation of the file system sandbox, combined with capabilities available to an authenticated FTP user, can be used to escape the file system restriction configured in ftpchroot(5). Moreover, the bug allows a malicious client to gain root privileges.
                
            References
                    | Link | Resource | 
|---|---|
| https://security.FreeBSD.org/advisories/FreeBSD-SA-20:30.ftpd.asc | Vendor Advisory | 
| https://security.FreeBSD.org/advisories/FreeBSD-SA-20:30.ftpd.asc | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 05:37
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://security.FreeBSD.org/advisories/FreeBSD-SA-20:30.ftpd.ascĀ - Vendor Advisory | 
Information
                Published : 2021-03-26 21:15
Updated : 2024-11-21 05:37
NVD link : CVE-2020-7468
Mitre link : CVE-2020-7468
CVE.ORG link : CVE-2020-7468
JSON object : View
Products Affected
                freebsd
- freebsd
 
CWE
                