[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2007-1507Date: (C)2007-03-20   (M)2023-12-22


The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECTRACK-1017807
BID-23060
SECUNIA-24582
SECUNIA-24599
SECUNIA-24607
SECUNIA-24720
ADV-2007-1033
DSA-1271
GLSA-200704-03
MDKSA-2007:066
http://www.openafs.org/pipermail/openafs-announce/2007/000185.html
http://www.openafs.org/pipermail/openafs-announce/2007/000186.html
http://www.openafs.org/pipermail/openafs-announce/2007/000187.html
openafs-setuid-privilege-escalation(33180)

CWE    1
CWE-16

© SecPod Technologies