René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

88 lines
3.3 KiB
JSON

{
"id": "CVE-2006-4663",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-09-09T00:04:00.000",
"lastModified": "2018-10-17T21:38:57.730",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "** DISPUTED ** The source code tar archive of the Linux kernel 2.6.16, 2.6.17.11, and possibly other versions specifies weak permissions (0666 and 0777) for certain files and directories, which might allow local users to insert Trojan horse source code that would be used during the next kernel compilation. NOTE: another researcher disputes the vulnerability, stating that he finds \"Not a single world-writable file or directory.\" CVE analysis as of 20060908 indicates that permissions will only be weak under certain unusual or insecure scenarios."
},
{
"lang": "es",
"value": "** DISCUSION ** El c\u00f3digo fuente del archivo tar del Linux kernel 2.6.16, 2.6.17.11, y posiblemente otras versiones especifican la debilidad de permisos (0666 and 0777) para ciertos archivos y directorios, lo cual permite a un usuario local insertan el c\u00f3digo fuente de un caballo de troya que podr\u00eda ser usado en la siguiente compilaci\u00f3n del kernel. NOTA: otro investigador discuti\u00f3 esta vulnerabilidad, indicando que \u00e9l encuentra \u201cno un simple archivo o directorio de escritura mundial.\u201d El an\u00e1lisis de CVE en fecha 08/09/2006 indica que los permisos ser\u00e1n solamente d\u00e9biles bajo ciertos escenarios inusuales o inseguros."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*",
"matchCriteriaId": "34E60197-56C3-485C-9609-B1C4A0E0FCB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A66ED53E-3139-4972-B027-D614BFFB8628"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/archive/1/445539/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/445540/100/0/threaded",
"source": "cve@mitre.org"
}
]
}