CVE-2005-2454
CVSS4.6
发布时间 :2005-12-31 00:00:00
修订时间 :2011-10-17 00:00:00
NMCOS    

[原文]IBM Lotus Notes 6.5.4 and 6.5.5, and 7.0.0 and 7.0.1, uses insecure default permissions (Everyone/Full Control) for the "Notes" folder and all children, which allows local users to gain privileges and modify, add, or delete files in that folder.


[CNNVD]IBM Lotus Notes本地不安全默认目录权限漏洞(CNNVD-200512-847)

        Lotus Domino/Notes服务器是一款基于WEB协同工作的应用程序架构,运行在Linux/Unix和Microsoft Windows操作系统平台下。
        Lotus Notes对文件访问的权限控制上存在漏洞,本地攻击者可能利用此漏洞非授权访问文件。Lotus Notes对notes目录及其所有子对象设置了不安全的默认权限,对Everyone组分配了Full Control权限,这允许本地攻击者能够删除、操控和替换应用程序的任何文件。
        

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-264 [权限、特权与访问控制]

- CPE (受影响的平台与产品)

cpe:/a:ibm:lotus_notes:6.5.5IBM Lotus Notes 6.5.5
cpe:/a:ibm:lotus_notes:7.0.1IBM Lotus Notes 7.0.1
cpe:/a:ibm:lotus_notes:7.0.0IBM Lotus Notes 7.0.0
cpe:/a:ibm:lotus_notes:6.5.4IBM Lotus Notes 6.5.4

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2454
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2454
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200512-847
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/383092
(UNKNOWN)  CERT-VN  VU#383092
http://xforce.iss.net/xforce/xfdb/29660
(UNKNOWN)  XF  lotusnotes-directory-insecure-permission(29660)
http://www.vupen.com/english/advisories/2006/4093
(VENDOR_ADVISORY)  VUPEN  ADV-2006-4093
http://www.securityfocus.com/bid/20612
(UNKNOWN)  BID  20612
http://www.securityfocus.com/archive/1/archive/1/449126/100/0/threaded
(UNKNOWN)  BUGTRAQ  20061018 Secunia Research: IBM Lotus Notes Insecure Default FolderPermissions
http://www.osvdb.org/29761
(UNKNOWN)  OSVDB  29761
http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21246773
(UNKNOWN)  CONFIRM  http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21246773
http://securitytracker.com/id?1017086
(UNKNOWN)  SECTRACK  1017086
http://secunia.com/secunia_research/2005-29/advisory/
(VENDOR_ADVISORY)  MISC  http://secunia.com/secunia_research/2005-29/advisory/
http://secunia.com/advisories/27342
(VENDOR_ADVISORY)  SECUNIA  27342
http://secunia.com/advisories/19537
(VENDOR_ADVISORY)  SECUNIA  19537

- 漏洞信息

IBM Lotus Notes本地不安全默认目录权限漏洞
中危 权限许可和访问控制
2005-12-31 00:00:00 2006-10-19 00:00:00
本地  
        Lotus Domino/Notes服务器是一款基于WEB协同工作的应用程序架构,运行在Linux/Unix和Microsoft Windows操作系统平台下。
        Lotus Notes对文件访问的权限控制上存在漏洞,本地攻击者可能利用此漏洞非授权访问文件。Lotus Notes对notes目录及其所有子对象设置了不安全的默认权限,对Everyone组分配了Full Control权限,这允许本地攻击者能够删除、操控和替换应用程序的任何文件。
        

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://www.ers.ibm.com/

- 漏洞信息

29761
IBM Lotus Notes Installation Default Permission Weakness
Local Access Required Misconfiguration
Loss of Integrity Upgrade
Exploit Public RBS Confirmed, Vendor Verified, Coordinated Disclosure

- 漏洞描述

Lotus Notes contains a flaw that may allow a malicious user to manipulate application's files. The issue is triggered due to default permissions that grant "Everyone" group "Full Control" on the 'notes' directory and all child objects. It is possible that the flaw may allow arbitrary files manipulation resulting in a loss of integrity.

- 时间线

2006-10-19 2005-07-22
Unknow 2006-10-18

- 解决方案

Upgrade to version 7.0.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

IBM Lotus Notes Local Insecure Default Directory Permissions Vulnerability
Design Error 20612
No Yes
2006-10-18 12:00:00 2007-10-25 08:36:00
Carsten Eiram of Secunia Research is credited with the discovery of this vulnerability.

- 受影响的程序版本

IBM Lotus Notes 7.0.1
IBM Lotus Notes 6.5.5
IBM Lotus Notes 6.5.4
IBM Lotus Notes 8.0
IBM Lotus Notes 7.0
IBM Lotus Notes 7.0.2

- 不受影响的程序版本

IBM Lotus Notes 7.0.2

- 漏洞讨论

IBM Lotus Notes is prone to a vulnerability regarding insecure default permissions on the application directory.

A local attacker can exploit this issue to access and modify arbitrary files in the application directory; this may aid in further attacks.

- 漏洞利用

To exploit this issue, an attacker simply requires local access to a vulnerable computer.

- 解决方案

The vendor has released a patch to address this issue. Please contact the vendor for details on obtaining and applying the appropriate updates.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站