CVE-2000-0719
CVSS6.2
发布时间 :2000-10-20 00:00:00
修订时间 :2008-09-05 16:21:43
NMCOS    

[原文]VariCAD 7.0 is installed with world-writeable files, which allows local users to replace the VariCAD programs with a Trojan horse program.


[CNNVD]VariCAD文件覆盖漏洞(CNNVD-200010-073)

        VariCAD 7.0版本安装全局可写文件。本地用户可以利用该漏洞用特洛伊木马程序替换VariCAD程序。

- CVSS (基础分值)

CVSS分值: 6.2 [中等(MEDIUM)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0719
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0719
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200010-073
(官方数据源) CNNVD

- 其它链接及资源

http://archives.neohapsis.com/archives/bugtraq/2000-08/0126.html
(VENDOR_ADVISORY)  BUGTRAQ  20000810 VariCAD 7.0 premission vulnerability

- 漏洞信息

VariCAD文件覆盖漏洞
中危 访问验证错误
2000-10-20 00:00:00 2005-10-20 00:00:00
本地  
        VariCAD 7.0版本安装全局可写文件。本地用户可以利用该漏洞用特洛伊木马程序替换VariCAD程序。

- 公告与补丁

        Change permissions of affected files and directories to 755.
        Affected files and directories:
        --------------------------------------
        /usr/bin/xvcad/dxfin
        /usr/bin/xvcad/igesin
        /usr/bin/xvcad/var_rm
        /usr/bin/xvcad/glib/*
        /usr/lib/xvcad/*

- 漏洞信息

13255
VariCAD Installation Insecure File Permissions

- 漏洞描述

Unknown or Incomplete

- 时间线

2000-08-10 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

VariCAD File Overwrite Vulnerability
Access Validation Error 1862
No No
2000-08-08 12:00:00 2009-07-11 03:56:00
This vulnerability was reported by Narrow <nss@privacyx.com> on 10-08-2000

- 受影响的程序版本

VariCAD VariCAD 7.0
+ RedHat Linux 6.0 x

- 漏洞讨论

A vulnerability exists in the popular CAD application Varicad 7.0. The installation creates executable files which are world-writeable. This may allow a trojan program to overwrite program files, leaving the system open to further attacks such as replacing the executables with modified versions. In this case, an attacker may then wait for the user to run the modified binaries, which could, for example, create an suid shell in a hidden place or add to the users .rhosts file, which can lead to an elevation of privileges.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any publicly available exploits for this vulnerability. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Change permissions of affected files and directories to 755.

Affected files and directories:
--------------------------------------
/usr/bin/xvcad/dxfin
/usr/bin/xvcad/igesin
/usr/bin/xvcad/var_rm

/usr/bin/xvcad/glib/*
/usr/lib/xvcad/*

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站