René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

201 lines
7.1 KiB
JSON

{
"id": "CVE-2007-3852",
"sourceIdentifier": "secalert@redhat.com",
"published": "2007-08-14T18:17:00.000",
"lastModified": "2023-02-13T02:18:16.177",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The init script (sysstat.in) in sysstat 5.1.2 up to 7.1.6 creates /tmp/sysstat.run insecurely, which allows local users to execute arbitrary code."
},
{
"lang": "es",
"value": "El script init (sysstat.in) en sysstat versiones 5.1.2 hasta 7.1.6, crea de manera no segura el archivo /tmp/sysstat.run, lo que permite a usuarios locales ejecutar c\u00f3digo arbitrario."
}
],
"vendorComments": [
{
"organization": "Red Hat",
"comment": "This issue did not affect the versions of sysstat as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.\n\nFor Red Hat Enterprise Linux 5, Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251200\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.",
"lastModified": "2008-05-12T00:00:00"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "32CD4705-19AC-4206-9BEF-B3AA990454F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D7F70CFB-2ADC-4200-8FD0-182FA66AAA2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4340FE60-FEF1-4963-8815-D70C2B1E3200"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EDFB9169-E45A-4EBA-9886-85F62F57402E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "14D823DF-8E61-4BA5-B9B6-8DBADFDDF4ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DA29CC09-F246-479C-85A6-082E7DBD825B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A318D2-675D-46E8-A0A0-F4CFA531F5B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "55EF88AF-E44D-42FB-B4C9-3B88A6FC0B11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AD4F2BD8-ED83-4B53-8E97-84BAA1CEA911"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C3FC0732-FAB9-4DED-94A7-EF605162834B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0D4F62C9-7935-4B09-9279-1026F4E109DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9CB8D001-6219-44BB-A71C-440F52A3430A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FD6BEB86-118F-40AB-BABA-AC26B8FBA30F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7BD7CD22-7CD3-4829-8BF9-5375A562A039"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A4D6E46-2281-4A6B-A1C2-048352A7C1BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D9BC25B8-9D00-46D4-AF3D-4ABD53927FC4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EB703663-DB5D-4BB9-83DF-CEDC163E0265"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EDD358ED-89BA-472E-A908-C25F81AAA954"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:7.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CA47ADFC-D33C-461B-830A-7B2C448AA263"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:7.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FDF3D513-A79F-453F-9E5E-CB3A043EFEAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysstat:sysstat:7.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "793C580B-A8C2-423B-AB3C-5954B00D39DD"
}
]
}
]
}
],
"references": [
{
"url": "http://www.redhat.com/support/errata/RHSA-2011-1005.html",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/25380",
"source": "secalert@redhat.com"
},
{
"url": "https://bugs.gentoo.org/show_bug.cgi?id=188808",
"source": "secalert@redhat.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36045",
"source": "secalert@redhat.com"
}
]
}