2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2005-3121" ,
"sourceIdentifier" : "security@debian.org" ,
"published" : "2005-10-20T23:02:00.000" ,
"lastModified" : "2008-09-05T20:53:31.217" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A rule file in module-assistant before 0.9.10 causes a temporary file to be created insecurely, which allows local users to conduct unauthorized operations."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:N/I:P/A:N" ,
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 2.1
} ,
"baseSeverity" : "LOW" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eduard_bloch:module-assistant:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "0.9.9" ,
"matchCriteriaId" : "CB9AFFE4-19D0-4C09-B390-11CCBFF8D3B4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eduard_bloch:module-assistant:0.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "02B9511C-B04A-450D-9AAA-57C9BBB23289"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eduard_bloch:module-assistant:0.9.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C0C6AEFA-D2DF-4C95-BE5F-3BFAA14F624D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eduard_bloch:module-assistant:0.9.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B5E44398-57BD-440D-94AE-F282837A549F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eduard_bloch:module-assistant:0.9.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B03F4550-129C-4168-9CC2-8461B090A8A5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eduard_bloch:module-assistant:0.9.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B8D8DD9E-EFBF-45E1-88F0-3B0C9FFA5958"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eduard_bloch:module-assistant:0.9.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E1AE4734-1C15-4D21-A789-ABC4238B82AB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eduard_bloch:module-assistant:0.9.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "09E2A4D0-AB78-4608-AFA7-F46669564A83"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eduard_bloch:module-assistant:0.9.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5BAFC6F0-7DE7-46F4-B669-A0D0EC3D05A7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eduard_bloch:module-assistant:0.9.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D6D70E0E-37A3-4D51-823B-CE0291D4194F"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/17267" ,
"source" : "security@debian.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.debian.org/security/2005/dsa-867" ,
"source" : "security@debian.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/15151" ,
"source" : "security@debian.org"
}
]
}