Vulnerability Name: | CVE-2004-0107 (CCN-15428) | ||||||||||||||||||||
Assigned: | 2004-03-10 | ||||||||||||||||||||
Published: | 2004-03-10 | ||||||||||||||||||||
Updated: | 2017-10-11 | ||||||||||||||||||||
Summary: | The (1) post and (2) trigger scripts in sysstat 4.0.7 and earlier allow local users to overwrite arbitrary files via symlink attacks on temporary files, a different vulnerability than CVE-2004-0108. | ||||||||||||||||||||
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||||||
Vulnerability Consequences: | File Manipulation | ||||||||||||||||||||
References: | Source: SGI Type: Patch 20040302-01-U Source: MITRE Type: CNA CVE-2004-0107 Source: CCN Type: RHSA-2004-053 sysstat security update Source: CCN Type: RHSA-2004-093 Updated sysstat packages fix security vulnerabilities Source: CCN Type: CIAC Information Bulletin O-097 Red Hat Sysstat Packages contain Vulnerability Source: CIAC Type: UNKNOWN O-097 Source: CCN Type: CIAC FORMATION BULLETIN P-146 bsmtpd Source: CCN Type: GLSA-200404-04 Multiple vulnerabilities in sysstat Source: CCN Type: GLSA 200404-04 Multiple vulnerabilities in sysstat Source: OSVDB Type: UNKNOWN 6884 Source: CCN Type: OSVDB ID: 6884 sysstat trigger Script Symlink Arbitrary File Overwrite Source: REDHAT Type: Patch, Vendor Advisory RHSA-2004:053 Source: REDHAT Type: UNKNOWN RHSA-2004:093 Source: BID Type: Patch, Vendor Advisory 9838 Source: CCN Type: BID-9838 Sysstat Insecure Temporary File Creation Vulnerability Source: XF Type: UNKNOWN sysstat-post-trigger-symlink(15428) Source: XF Type: UNKNOWN sysstat-post-trigger-symlink(15428) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10737 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:849 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:862 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |