Vulnerability Name:

CVE-2001-1092 (CCN-7102)

Assigned:2001-09-10
Published:2001-09-10
Updated:2017-12-19
Summary:msgchk in Digital UNIX 4.0G and earlier allows a local user to read the first line of arbitrary files via a symlink attack on the .mh_profile file.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
2.6 Low (CCN CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:File Manipulation
References:Source: CCN
Type: BugTraq Mailing List, Sun Sep 09 2001 - 21:54:07 CDT
Digital Unix 4.0x msgchk multiple vulnerabilities

Source: MITRE
Type: CNA
CVE-2001-1092

Source: CCN
Type: US-CERT VU#440539
Digital Unix msgchk vulnerable to file contents disclosure via symlink redirection of profile

Source: CERT-VN
Type: US Government Resource
VU#440539

Source: CCN
Type: OSVDB ID: 8766
Digital Unix msgchk .mh_profile Symlink Arbitrary File Access

Source: BUGTRAQ
Type: Exploit, Vendor Advisory
20010910 Digital Unix 4.0x msgchk multiple vulnerabilities

Source: BID
Type: Exploit, Vendor Advisory
3320

Source: CCN
Type: BID-3320
Digital Unix MSGCHK MH_PROFILE Symbolic Link Vulnerability

Source: XF
Type: UNKNOWN
du-msgchk-symlink(7102)

Source: XF
Type: UNKNOWN
du-msgchk-symlink(7102)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:compaq:tru64:4.0d:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:4.0e:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:4.0f:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:4.0g:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:compaq:tru64:4.0d:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:4.0e:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:4.0f:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:4.0g:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    compaq tru64 4.0d
    compaq tru64 4.0e
    compaq tru64 4.0f
    compaq tru64 4.0g
    compaq tru64 4.0d
    compaq tru64 4.0e
    compaq tru64 4.0f
    compaq tru64 4.0g