ID CVE-2007-1507
Summary The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.
References
Vulnerable Configurations
  • cpe:2.3:a:openafs:openafs:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.5.9:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.5.9:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.5.10:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.5.10:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.5.11:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.5.11:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.5.12:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.5.12:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.5.13:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.5.13:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.5.14:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.5.14:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.5.15:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.5.15:*:*:*:*:*:*:*
  • cpe:2.3:a:openafs:openafs:1.5.16:*:*:*:*:*:*:*
    cpe:2.3:a:openafs:openafs:1.5.16:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 29-07-2017 - 01:30)
Impact:
Exploitability:
CWE CWE-16
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 23060
debian DSA-1271
gentoo GLSA-200704-03
mandriva MDKSA-2007:066
mlist
  • [OpenAFS-announce] 20070319 OpenAFS 1.4.4 available
  • [OpenAFS-announce] 20070319 OpenAFS 1.5.17 release available
  • [OpenAFS-announce] 20070320 OpenAFS Security Advisory 2007-001: privilege escalation in Unix-based clients
sectrack 1017807
secunia
  • 24582
  • 24599
  • 24607
  • 24720
vupen ADV-2007-1033
xf openafs-setuid-privilege-escalation(33180)
Last major update 29-07-2017 - 01:30
Published 20-03-2007 - 10:19
Last modified 29-07-2017 - 01:30
Back to Top