Vulnerability Name:

CVE-2007-2030 (CCN-34063)

Assigned:2007-04-16
Published:2007-04-16
Updated:2017-07-29
Summary:lharc.c in lha does not securely create temporary files, which might allow local users to read or write files by creating a file before LHA is invoked.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:N/A:N)
4.3 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:N/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): None
2.6 Low (CCN CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:P/A:P)
2.3 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:P/A:P/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:File Manipulation
References:Source: MITRE
Type: CNA
CVE-2007-2030

Source: OSVDB
Type: UNKNOWN
37049

Source: SECUNIA
Type: UNKNOWN
25519

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2007:117

Source: CCN
Type: OSVDB ID: 37049
LHA lharc.c Insecure Temporary File Creation

Source: BID
Type: UNKNOWN
24336

Source: CCN
Type: BID-24336
LHA Insecure Temporary File Creation Vulnerability

Source: CCN
Type: Red Hat Bugzilla Bug 236585
CVE-2007-2030 /tmp race in lha

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=236585

Source: XF
Type: UNKNOWN
lha-lharc-symlink(34063)

Source: XF
Type: UNKNOWN
lha-lharc-symlink(34063)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:redhat:enterprise_linux:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:fedora_core:core_5.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:tsugio_okamoto:lha:1.14:*:*:*:*:*:*:*
  • AND
  • cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora_core:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    redhat enterprise linux 2.1
    redhat enterprise linux 3.0
    redhat enterprise linux 4.0
    redhat fedora core core_5.0
    tsugio_okamoto lha 1.14
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 3
    redhat enterprise linux 4
    redhat enterprise linux 2.1
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 3.0
    fedoraproject fedora core 5
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2007.1