Vulnerability Name:

CVE-2001-0625 (CCN-6607)

Assigned:2001-05-25
Published:2001-05-25
Updated:2021-04-09
Summary:ftpdownload in Computer Associates InoculateIT 6.0 allows a local attacker to overwrite arbitrary files via a symlink attack on /tmp/ftpdownload.log .
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
2.6 Low (CCN CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:File Manipulation
References:Source: BUGTRAQ
Type: Vendor Advisory
20010525 Security Bug in InoculateIT for Linux (fwd)

Source: CCN
Type: BugTraq Mailing List, Fri May 25 2001 - 12:54:13 CDT
Security Bug in InoculateIT for Linux (fwd)

Source: MITRE
Type: CNA
CVE-2001-0625

Source: OSVDB
Type: UNKNOWN
1843

Source: CCN
Type: OSVDB ID: 1843
InoculateIT ftpdownload.log Symbolic Link File Overwriting

Source: BID
Type: UNKNOWN
2778

Source: CCN
Type: BID-2778
Computer Associates InoculateIT Symbolic Link File Overwriting Vulnerability

Source: XF
Type: UNKNOWN
inoculateit-ftpdownload-symlink(6607)

Source: XF
Type: UNKNOWN
inoculateit-ftpdownload-symlink(6607)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:broadcom:inoculateit:6.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:broadcom:inoculateit:6.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:6.4:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    broadcom inoculateit 6.0
    ca inoculateit 6.0
    redhat linux 6.2
    suse suse linux 6.4
    debian debian linux 2.2
    mandrakesoft mandrake linux 7.1
    redhat linux 7
    mandrakesoft mandrake linux 7.2
    suse suse linux 7.0
    suse suse linux 7.1
    redhat linux 7.1
    mandrakesoft mandrake linux 8.0