{ "id": "CVE-2006-4316", "sourceIdentifier": "cve@mitre.org", "published": "2006-08-23T22:04:00.000", "lastModified": "2017-07-20T01:33:00.243", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "SSH Tectia Management Agent 2.1.2 allows local users to gain root privileges by running a program called sshd, which is obtained from a process listing when the \"Restart\" action is selected from the Management server GUI, which causes the agent to locate the pathname of the user's program and restart it with root privileges." }, { "lang": "es", "value": "El agente de administraci\u00f3n de SSH Tectia (SSH Tectia Management Agent 2.1.2) permite a usuarios locales obtener privilegios de root ejecutando un programa con nombre sshd, lo que se consigue mediante un listado de procesos cuando la acci\u00f3n \"Reiniciar\" (Restart) se selecciona desde la interfaz gr\u00e1fica de usuario (GUI) del servidor de administraci\u00f3n, lo cual provoca que el agente localice el nombre de ruta del programa del usuario y lo reinicie con privilegios de root." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 7.2 }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": true, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:tectia_manager:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "53793268-B61F-4730-8786-F22860B1270B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:tectia_manager:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "207A0CC3-240E-467E-A82D-DB9751378C2D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:tectia_manager:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "23D62693-EA3F-406E-AC66-79B1CD566F1C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:tectia_manager:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "25CE63BE-9056-408C-90D2-6E2CA2E258F0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ssh:tectia_manager:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9CF059D3-7250-44F9-9337-AD66A0F28071" } ] } ] } ], "references": [ { "url": "http://secunia.com/advisories/21559", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://securitytracker.com/id?1016744", "source": "cve@mitre.org" }, { "url": "http://www.osvdb.org/28159", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/19677", "source": "cve@mitre.org" }, { "url": "http://www.ssh.com/company/news/2006/english/security/article/776/", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28561", "source": "cve@mitre.org" } ] }