Описание
IBM Lotus Notes 8 for Linux before 8.0.1 uses (1) unspecified weak permissions for the installation kit obtained through a Notes 8 download and (2) 0777 permissions for the installdata file that is created by setup.sh, which allows local users to gain privileges via a Trojan horse file.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 8.0.1 (включая)
cpe:2.3:a:ibm:lotus_notes:*:*:linux:*:*:*:*:*
EPSS
Процентиль: 11%
0.00037
Низкий
6.9 Medium
CVSS2
Дефекты
CWE-264
Связанные уязвимости
github
почти 4 года назад
IBM Lotus Notes 8 for Linux before 8.0.1 uses (1) unspecified weak permissions for the installation kit obtained through a Notes 8 download and (2) 0777 permissions for the installdata file that is created by setup.sh, which allows local users to gain privileges via a Trojan horse file.
EPSS
Процентиль: 11%
0.00037
Низкий
6.9 Medium
CVSS2
Дефекты
CWE-264