ID |
CVE-2006-5968
|
Summary |
MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\APP folder, which is an untrusted search path element due to insecure permissions. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:alt-n:mdaemon:9.0.5:*:*:*:*:*:*:*
cpe:2.3:a:alt-n:mdaemon:9.0.5:*:*:*:*:*:*:*
-
cpe:2.3:a:alt-n:mdaemon:9.0.6:*:*:*:*:*:*:*
cpe:2.3:a:alt-n:mdaemon:9.0.6:*:*:*:*:*:*:*
-
cpe:2.3:a:alt-n:mdaemon:9.51:*:*:*:*:*:*:*
cpe:2.3:a:alt-n:mdaemon:9.51:*:*:*:*:*:*:*
-
cpe:2.3:a:alt-n:mdaemon:9.53:*:*:*:*:*:*:*
cpe:2.3:a:alt-n:mdaemon:9.53:*:*:*:*:*:*:*
|
CVSS |
Base: | 4.6 (as of 17-10-2018 - 21:46) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
LOCAL |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:L/AC:L/Au:N/C:P/I:P/A:P
|
refmap
via4
|
|
Last major update |
17-10-2018 - 21:46 |
Published |
17-11-2006 - 22:07 |
Last modified |
17-10-2018 - 21:46 |