mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
173 lines
5.3 KiB
JSON
173 lines
5.3 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2006-2916",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "artswrapper in aRts, when running setuid root on Linux 2.6.0 or later versions, does not check the return value of the setuid function call, which allows local users to gain root privileges by causing setuid to fail, which prevents artsd from dropping privileges."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20060615 rPSA-2006-0105-1 arts",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://www.securityfocus.com/archive/1/437362/100/0/threaded"
|
|
},
|
|
{
|
|
"name" : "[beast] 20061228 ANNOUNCE: BEAST/BSE v0.7.1",
|
|
"refsource" : "MLIST",
|
|
"url" : "http://mail.gnome.org/archives/beast/2006-December/msg00025.html"
|
|
},
|
|
{
|
|
"name" : "http://www.kde.org/info/security/advisory-20060614-2.txt",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.kde.org/info/security/advisory-20060614-2.txt"
|
|
},
|
|
{
|
|
"name" : "http://dot.kde.org/1150310128/",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://dot.kde.org/1150310128/"
|
|
},
|
|
{
|
|
"name" : "GLSA-200606-22",
|
|
"refsource" : "GENTOO",
|
|
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200606-22.xml"
|
|
},
|
|
{
|
|
"name" : "GLSA-200704-22",
|
|
"refsource" : "GENTOO",
|
|
"url" : "http://security.gentoo.org/glsa/glsa-200704-22.xml"
|
|
},
|
|
{
|
|
"name" : "MDKSA-2006:107",
|
|
"refsource" : "MANDRIVA",
|
|
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:107"
|
|
},
|
|
{
|
|
"name" : "SSA:2006-178-03",
|
|
"refsource" : "SLACKWARE",
|
|
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.468256"
|
|
},
|
|
{
|
|
"name" : "SUSE-SR:2006:015",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://www.novell.com/linux/security/advisories/2006_38_security.html"
|
|
},
|
|
{
|
|
"name" : "18429",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/18429"
|
|
},
|
|
{
|
|
"name" : "23697",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/23697"
|
|
},
|
|
{
|
|
"name" : "ADV-2006-2357",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2006/2357"
|
|
},
|
|
{
|
|
"name" : "ADV-2007-0409",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2007/0409"
|
|
},
|
|
{
|
|
"name" : "26506",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/26506"
|
|
},
|
|
{
|
|
"name" : "1016298",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1016298"
|
|
},
|
|
{
|
|
"name" : "20677",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/20677"
|
|
},
|
|
{
|
|
"name" : "20827",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/20827"
|
|
},
|
|
{
|
|
"name" : "20786",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/20786"
|
|
},
|
|
{
|
|
"name" : "20868",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/20868"
|
|
},
|
|
{
|
|
"name" : "20899",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/20899"
|
|
},
|
|
{
|
|
"name" : "25032",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/25032"
|
|
},
|
|
{
|
|
"name" : "25059",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/25059"
|
|
},
|
|
{
|
|
"name" : "arts-artwrapper-privilege-escalation(27221)",
|
|
"refsource" : "XF",
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27221"
|
|
}
|
|
]
|
|
}
|
|
}
|