Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2007-1507

Опубликовано: 20 мар. 2007
Источник: nvd
CVSS2: 7.5
EPSS Низкий

Описание

The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:openafs:openafs:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.7:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.9:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.10:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.11:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.12:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.13:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.14:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.15:*:*:*:*:*:*:*
cpe:2.3:a:openafs:openafs:1.5.16:*:*:*:*:*:*:*

EPSS

Процентиль: 79%
0.01327
Низкий

7.5 High

CVSS2

Дефекты

CWE-16

Связанные уязвимости

ubuntu
больше 18 лет назад

The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.

debian
больше 18 лет назад

The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x befo ...

github
больше 3 лет назад

The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.

fstec
больше 18 лет назад

Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 79%
0.01327
Низкий

7.5 High

CVSS2

Дефекты

CWE-16