Vulnerability Name:

CVE-1999-0735 (CCN-2265)

Assigned:1999-06-09
Published:1999-06-09
Updated:2008-09-09
Summary:KDE K-Mail allows local users to gain privileges via a symlink attack in temporary user directories.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-1999-016.0
security vulnerability in kmail

Source: MITRE
Type: CNA
CVE-1999-0735

Source: CCN
Type: RHSA-1999:015-01
KDE update for Red Hat Linux 6.0

Source: CCN
Type: Internet Security Systems Security Alert #27
KDE K-Mail File Creation Vulnerability

Source: CCN
Type: KDE Web site
KDE-1.1.2 versus KDE-1.1.1 List of problems fixed and features added

Source: CCN
Type: OSVDB ID: 8359
KDE KMail Local Symlink Privilege Escalation

Source: REDHAT
Type: UNKNOWN
RHSA-1999:015-01

Source: BID
Type: Exploit, Patch
300

Source: CCN
Type: BID-300
KDE K-Mail File Creation Vulnerability

Source: XF
Type: UNKNOWN
kde-kmail(2265)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:kde:k-mail:*:*:*:*:*:*:*:* (Version <= 1.1)

  • Configuration CCN 1:
  • cpe:/o:redhat:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:caldera:openlinux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:caldera:openlinux:1.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    kde k-mail *
    redhat linux 6.0
    caldera openlinux 2.2
    caldera openlinux 1.3