René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

158 lines
4.6 KiB
JSON

{
"id": "CVE-2006-2916",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-06-15T10:02:00.000",
"lastModified": "2018-10-18T16:43:41.043",
"vulnStatus": "Modified",
"evaluatorSolution": "Product is only vulnerable when running setuid root on Linux 2.6.0 or later versions.\r\nVendor links provide patches for each affected version.",
"descriptions": [
{
"lang": "en",
"value": "artswrapper in aRts, when running setuid root on Linux 2.6.0 or later versions, does not check the return value of the setuid function call, which allows local users to gain root privileges by causing setuid to fail, which prevents artsd from dropping privileges."
},
{
"lang": "es",
"value": "artswrapper en aRts, cuando se ejecuta como root sobre linux 2.6.0 o versiones posteriores, no valida la variable setuid de retorno de la llamada a la funci\u00f3n, lo que permite a usuarios locales ganar privilegios de root al provocar un fallo sobre setuid."
}
],
"vendorComments": [
{
"organization": "Red Hat",
"comment": "Not vulnerable. We do not ship aRts as setuid root on Red Hat Enterprise Linux 2.1, 3, or 4.",
"lastModified": "2006-08-16T00:00:00"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "HIGH",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 1.5,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kde:arts:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ECA4B1F0-C924-4308-862F-0FE65D7BAB4D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kde:arts:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2D979D-0731-4CE3-9D16-22EF314884A2"
}
]
}
]
}
],
"references": [
{
"url": "http://dot.kde.org/1150310128/",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://mail.gnome.org/archives/beast/2006-December/msg00025.html",
"source": "cve@mitre.org"
},
{
"url": "http://security.gentoo.org/glsa/glsa-200704-22.xml",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1016298",
"source": "cve@mitre.org"
},
{
"url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.468256",
"source": "cve@mitre.org"
},
{
"url": "http://www.gentoo.org/security/en/glsa/glsa-200606-22.xml",
"source": "cve@mitre.org"
},
{
"url": "http://www.kde.org/info/security/advisory-20060614-2.txt",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:107",
"source": "cve@mitre.org"
},
{
"url": "http://www.novell.com/linux/security/advisories/2006_38_security.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/437362/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/18429",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/23697",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/2357",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2007/0409",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27221",
"source": "cve@mitre.org"
}
]
}