| Vulnerability Name: | CVE-2004-1833 (CCN-15546) | ||||||||
| Assigned: | 2004-03-19 | ||||||||
| Published: | 2004-03-19 | ||||||||
| Updated: | 2017-07-11 | ||||||||
| Summary: | The admin.ib file in Borland Interbase 7.1 for Linux has default world writable permissions, which allows local users to gain database administrative privileges. | ||||||||
| CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Gain Privileges | ||||||||
| References: | Source: CCN Type: BugTraq Mailing List, Fri Mar 19 2004 - 14:50:48 CST iDEFENSE Security Advisory 03.19.04: Borland Interbase admin.ib Administrative Access Vulnerability Source: MITRE Type: CNA CVE-2004-1833 Source: CCN Type: SA11172 Borland Interbase "admin.ib" Insecure Default File Permissions Source: SECUNIA Type: Exploit, Patch, Vendor Advisory 11172 Source: CCN Type: SECTRACK ID: 1009500 Borland Interbase Unsafe Permissions on `admin.ib` Let Local Users Gain Database Administrative Privileges Source: SECTRACK Type: Exploit, Patch, Vendor Advisory 1009500 Source: CCN Type: Interbase Web site Borland InterBase Software Cross Platform Embedded Database Source: IDEFENSE Type: Vendor Advisory 20040319 Borland Interbase admin.ib Administrative Access Vulnerability Source: OSVDB Type: Vendor Advisory 4381 Source: CCN Type: OSVDB ID: 43809 Default Theme for Exero CMS usercp/avatar.php theme Parameter Traversal Local File Inclusion Source: CCN Type: OSVDB ID: 4381 Default Theme for Exero CMS usercp/avatar.php theme Parameter Traversal Local File Inclusion Source: BID Type: Patch, Vendor Advisory 9929 Source: CCN Type: BID-9929 Borland Interbase Database User Privilege Escalation Vulnerability Source: XF Type: UNKNOWN interbase-admin-gain-privileges(15546) Source: XF Type: UNKNOWN interbase-admin-gain-privileges(15546) | ||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||