2024-04-04 08:46:00 +00:00

94 lines
3.3 KiB
JSON

{
"id": "CVE-2007-4998",
"sourceIdentifier": "secalert@redhat.com",
"published": "2008-01-31T21:00:00.000",
"lastModified": "2008-11-15T06:59:20.797",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "cp, when running with an option to preserve symlinks on multiple OSes, allows local, user-assisted attackers to overwrite arbitrary files via a symlink attack using crafted directories containing multiple source files that are copied to the same destination."
},
{
"lang": "es",
"value": "El comando cp, cuando se ejecuta con una opci\u00f3n para preservar enlaces simb\u00f3licos en m\u00faltiples sistemas operativos, permite a atacantes locales ayudados por usuarios sobrescribir archivos de su elecci\u00f3n a trav\u00e9s de un ataque de enlaces simb\u00f3licos utilizando directorios manipulados que contienen m\u00faltiples archivos fuente que se copian al mismo destino"
}
],
"vendorComments": [
{
"organization": "Red Hat",
"comment": "This issue affects the busybox package in Red Hat Enterprise Linux 2.1, 3, 4, and 5,\n\nThis issue affects the fileutils package in Red Hat Enterprise Linux 2.1.\n\nThis issue affects the coreutils package in Red Hat Enterprise Linux 3.\n\nThe coreutils package in Red Hat Enterprise Linux 4 and 5 are not vulnerable to this issue.\n\nGiven this issue has minimal risk we do not intend to issues updates to correct this issue in affected versions of Red Hat Enterprise Linux.\n\nFor more information please see:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=356471",
"lastModified": "2008-02-12T00:00:00"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.4,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/43228",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=356471",
"source": "secalert@redhat.com"
},
{
"url": "https://issues.rpath.com/browse/RPL-2023",
"source": "secalert@redhat.com"
}
]
}