Vulnerability Name: | CVE-2004-0157 (CCN-15873) | ||||||||
Assigned: | 2004-04-14 | ||||||||
Published: | 2004-04-14 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | x11.c in xonix 1.4 and earlier uses the current working directory to find and execute the rmail program, which allows local users to execute arbitrary code by modifying the path to point to a malicious rmail program. | ||||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: MITRE Type: CNA CVE-2004-0157 Source: CCN Type: SA11382 xonix Privilege Escalation Vulnerability Source: SECUNIA Type: UNKNOWN 11382 Source: CCN Type: SECTRACK ID: 1009789 Xonix Game High Score Mail Function Lets Local Users Gain Elevated Privileges Source: SECTRACK Type: UNKNOWN 1009789 Source: MISC Type: UNKNOWN http://shellcode.org/Advisories/XONIX.txt Source: DEBIAN Type: Patch, Vendor Advisory DSA-484 Source: DEBIAN Type: DSA-484 xonix -- failure to drop privileges Source: OSVDB Type: UNKNOWN 5358 Source: CCN Type: OSVDB ID: 5358 xonix Mailer Privilege Escalation Source: BID Type: UNKNOWN 10149 Source: CCN Type: BID-10149 Xonix X11 Game Insecure Privilege Dropping Vulnerability Source: XF Type: UNKNOWN xonix-privilege-dropping(15873) Source: XF Type: UNKNOWN xonix-privilege-dropping(15873) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |