Vulnerability Name:

CVE-2005-1916 (CCN-21257)

Assigned:2005-07-05
Published:2005-07-05
Updated:2016-10-18
Summary:linki.py in ekg 2005-06-05 and earlier allows local users to overwrite or create arbitrary files via a symlink attack on temporary files.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
2.6 Low (CCN CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:File Manipulation
References:Source: MITRE
Type: CNA
CVE-2005-1916

Source: CCN
Type: Eksperymentalny Klient Gadu-Gadu Web page
eksperymentalny klient gadu-gadu

Source: BUGTRAQ
Type: UNKNOWN
20050705 ekg insecure temporary file creation and arbitrary code execution

Source: BUGTRAQ
Type: UNKNOWN
20050721 Multiple vulnerabilities in libgadu and ekg package

Source: CCN
Type: Debian Web site
console Gadu Gadu client for UNIX systems

Source: DEBIAN
Type: UNKNOWN
DSA-760

Source: DEBIAN
Type: DSA-760
ekg -- several vulnerabilities

Source: CCN
Type: OSVDB ID: 17722
ekg linki.py Add-on Symlink Arbitrary File Manipulation

Source: CCN
Type: OSVDB ID: 18072
ekg Unspecified Contributed Script Insecure Temporary File Creation

Source: CCN
Type: BID-14146
EKG Insecure Temporary File Creation Vulnerability

Source: CCN
Type: BID-14307
EKG Insecure Temporary File Creation Vulnerability

Source: CCN
Type: USN-162-1
ekg and Gadu library vulnerabilities

Source: CCN
Type: Zatax Security Advisory ekg-06062005
ekg insecure temporary file creation and arbitrary code execution

Source: MISC
Type: Vendor Advisory
http://www.zataz.net/adviso/ekg-06062005.txt

Source: XF
Type: UNKNOWN
ekg-symlink(21257)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ekg:ekg:2005-06-05:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:760
    V
    several vulnerabilities
    2005-07-18
    BACK
    ekg ekg 2005-06-05