{ "id": "CVE-2005-4660", "sourceIdentifier": "cve@mitre.org", "published": "2005-12-31T05:00:00.000", "lastModified": "2008-09-05T20:57:28.220", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Race condition in IPCop (aka IPCop Firewall) before 1.4.10 might allow local users to overwrite system configuration files and gain privileges by replacing a backup archive during the time window when the archive is owned by \"nobody\" but not yet encrypted, then executing ipcoprscfg to restore from this backup." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:N/I:P/A:N", "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 1.2 }, "baseSeverity": "LOW", "exploitabilityScore": 1.9, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:ipcop:ipcop:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "ED06B358-E0EF-4E4F-848A-E720ABA78633" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcop:ipcop:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "B204E3C9-131D-40E6-A441-1CBA4E953953" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcop:ipcop:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "2C84B184-A911-46F0-BB7E-D63F401A41CE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcop:ipcop:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "EC5966C1-DC13-4C80-AEC8-C64C8B2597DE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcop:ipcop:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "0D86E163-5BE5-443D-AEA0-A245A746ED7D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcop:ipcop:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "165FE5EE-4B87-47E1-8198-8097E29FC2A9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcop:ipcop:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "B378FA93-43FC-4B83-990B-EB71CDE011C5" } ] } ] } ], "references": [ { "url": "http://secunia.com/advisories/17513/", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "http://sourceforge.net/tracker/index.php?func=detail&aid=1344047&group_id=40604&atid=428516", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/15378", "source": "cve@mitre.org" } ] }