Vulnerability Name:

CVE-2005-0503 (CCN-19397)

Assigned:2005-02-21
Published:2005-02-21
Updated:2008-09-10
Summary:uim before 0.4.5.1 trusts certain environment variables when libUIM is used in setuid or setgid applications, which allows local users to gain privileges.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2005-0503

Source: CCN
Type: Uim Mailing List, Sun Feb 20 05:13:52 PST 2005
Uim] uim 0.4.5.1 released

Source: MLIST
Type: Vendor Advisory
[uim] 20050220 uim 0.4.5.1 released

Source: CCN
Type: SA13981
uim Environment Variable Trust Privilege Escalation

Source: SECUNIA
Type: Patch, Vendor Advisory
13981

Source: CCN
Type: uim Web site
FrontPage - A uim Wiki

Source: CCN
Type: GLSA-200502-31
uim: Privilege escalation vulnerability

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2005:046

Source: CCN
Type: OSVDB ID: 14013
uim Environment Variable Local Privilege Escalation

Source: BID
Type: Patch, Vendor Advisory
12604

Source: CCN
Type: BID-12604
UIM LibUIM Environment Variables Privilege Escalation Weakness

Source: XF
Type: UNKNOWN
uim-environment-variable-gain-privilege(19397)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:uim:uim:0.4.5:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    uim uim 0.4.5
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux 10.1