Vulnerabilites related to avaya - aura_sip_enablement_services
cve-2009-3939
Vulnerability from cvelistv5
Published
2009-11-16 19:00
Modified
2024-08-07 06:45
Severity ?
Summary
The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.
References
http://secunia.com/advisories/38276third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.htmlvendor-advisory, x_refsource_SUSE
http://www.ubuntu.com/usn/usn-864-1vendor-advisory, x_refsource_UBUNTU
https://bugzilla.redhat.com/show_bug.cgi?id=526068x_refsource_MISC
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/38779third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/37019vdb-entry, x_refsource_BID
http://support.avaya.com/css/P8/documents/100073666x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/37909third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.htmlvendor-advisory, x_refsource_SUSE
http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2010/dsa-1996vendor-advisory, x_refsource_DEBIAN
http://www.openwall.com/lists/oss-security/2009/11/13/1mailing-list, x_refsource_MLIST
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10310vdb-entry, signature, x_refsource_OVAL
https://rhn.redhat.com/errata/RHSA-2010-0095.htmlvendor-advisory, x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.htmlvendor-advisory, x_refsource_SUSE
http://osvdb.org/60201vdb-entry, x_refsource_OSVDB
https://rhn.redhat.com/errata/RHSA-2010-0046.htmlvendor-advisory, x_refsource_REDHAT
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7540vdb-entry, signature, x_refsource_OVAL
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/38017third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/38492third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T06:45:50.560Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "38276",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/38276",
               },
               {
                  name: "SUSE-SA:2009:061",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html",
               },
               {
                  name: "USN-864-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-864-1",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=526068",
               },
               {
                  name: "SUSE-SA:2010:001",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html",
               },
               {
                  name: "38779",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/38779",
               },
               {
                  name: "37019",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/37019",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.avaya.com/css/P8/documents/100073666",
               },
               {
                  name: "SUSE-SA:2010:012",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html",
               },
               {
                  name: "37909",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/37909",
               },
               {
                  name: "SUSE-SA:2010:014",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html",
               },
               {
                  name: "SUSE-SA:2009:064",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html",
               },
               {
                  name: "DSA-1996",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2010/dsa-1996",
               },
               {
                  name: "[oss-security] 20091113 CVE request: kernel: bad permissions on megaraid_sas sysfs files",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2009/11/13/1",
               },
               {
                  name: "oval:org.mitre.oval:def:10310",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10310",
               },
               {
                  name: "RHSA-2010:0095",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://rhn.redhat.com/errata/RHSA-2010-0095.html",
               },
               {
                  name: "SUSE-SA:2010:005",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html",
               },
               {
                  name: "60201",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://osvdb.org/60201",
               },
               {
                  name: "RHSA-2010:0046",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://rhn.redhat.com/errata/RHSA-2010-0046.html",
               },
               {
                  name: "oval:org.mitre.oval:def:7540",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7540",
               },
               {
                  name: "SUSE-SA:2010:010",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html",
               },
               {
                  name: "38017",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/38017",
               },
               {
                  name: "38492",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/38492",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2009-11-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-09-18T12:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "38276",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/38276",
            },
            {
               name: "SUSE-SA:2009:061",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html",
            },
            {
               name: "USN-864-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-864-1",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=526068",
            },
            {
               name: "SUSE-SA:2010:001",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html",
            },
            {
               name: "38779",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/38779",
            },
            {
               name: "37019",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/37019",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.avaya.com/css/P8/documents/100073666",
            },
            {
               name: "SUSE-SA:2010:012",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html",
            },
            {
               name: "37909",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/37909",
            },
            {
               name: "SUSE-SA:2010:014",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html",
            },
            {
               name: "SUSE-SA:2009:064",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html",
            },
            {
               name: "DSA-1996",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2010/dsa-1996",
            },
            {
               name: "[oss-security] 20091113 CVE request: kernel: bad permissions on megaraid_sas sysfs files",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2009/11/13/1",
            },
            {
               name: "oval:org.mitre.oval:def:10310",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10310",
            },
            {
               name: "RHSA-2010:0095",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://rhn.redhat.com/errata/RHSA-2010-0095.html",
            },
            {
               name: "SUSE-SA:2010:005",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html",
            },
            {
               name: "60201",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://osvdb.org/60201",
            },
            {
               name: "RHSA-2010:0046",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://rhn.redhat.com/errata/RHSA-2010-0046.html",
            },
            {
               name: "oval:org.mitre.oval:def:7540",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7540",
            },
            {
               name: "SUSE-SA:2010:010",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html",
            },
            {
               name: "38017",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/38017",
            },
            {
               name: "38492",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/38492",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2009-3939",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "38276",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/38276",
                  },
                  {
                     name: "SUSE-SA:2009:061",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html",
                  },
                  {
                     name: "USN-864-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-864-1",
                  },
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=526068",
                     refsource: "MISC",
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=526068",
                  },
                  {
                     name: "SUSE-SA:2010:001",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html",
                  },
                  {
                     name: "38779",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/38779",
                  },
                  {
                     name: "37019",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/37019",
                  },
                  {
                     name: "http://support.avaya.com/css/P8/documents/100073666",
                     refsource: "CONFIRM",
                     url: "http://support.avaya.com/css/P8/documents/100073666",
                  },
                  {
                     name: "SUSE-SA:2010:012",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html",
                  },
                  {
                     name: "37909",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/37909",
                  },
                  {
                     name: "SUSE-SA:2010:014",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html",
                  },
                  {
                     name: "SUSE-SA:2009:064",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html",
                  },
                  {
                     name: "DSA-1996",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2010/dsa-1996",
                  },
                  {
                     name: "[oss-security] 20091113 CVE request: kernel: bad permissions on megaraid_sas sysfs files",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2009/11/13/1",
                  },
                  {
                     name: "oval:org.mitre.oval:def:10310",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10310",
                  },
                  {
                     name: "RHSA-2010:0095",
                     refsource: "REDHAT",
                     url: "https://rhn.redhat.com/errata/RHSA-2010-0095.html",
                  },
                  {
                     name: "SUSE-SA:2010:005",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html",
                  },
                  {
                     name: "60201",
                     refsource: "OSVDB",
                     url: "http://osvdb.org/60201",
                  },
                  {
                     name: "RHSA-2010:0046",
                     refsource: "REDHAT",
                     url: "https://rhn.redhat.com/errata/RHSA-2010-0046.html",
                  },
                  {
                     name: "oval:org.mitre.oval:def:7540",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7540",
                  },
                  {
                     name: "SUSE-SA:2010:010",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html",
                  },
                  {
                     name: "38017",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/38017",
                  },
                  {
                     name: "38492",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/38492",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2009-3939",
      datePublished: "2009-11-16T19:00:00",
      dateReserved: "2009-11-16T00:00:00",
      dateUpdated: "2024-08-07T06:45:50.560Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2006-1058
Vulnerability from cvelistv5
Published
2006-04-04 10:00
Modified
2024-08-07 16:56
Severity ?
Summary
BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.
References
http://secunia.com/advisories/25098third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/17330vdb-entry, x_refsource_BID
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9483vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/19477third-party-advisory, x_refsource_SECUNIA
http://bugs.busybox.net/view.php?id=604x_refsource_CONFIRM
http://secunia.com/advisories/25848third-party-advisory, x_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2007-250.htmx_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2007-0244.htmlvendor-advisory, x_refsource_REDHAT
https://exchange.xforce.ibmcloud.com/vulnerabilities/25569vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T16:56:15.493Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "25098",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25098",
               },
               {
                  name: "17330",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/17330",
               },
               {
                  name: "oval:org.mitre.oval:def:9483",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9483",
               },
               {
                  name: "19477",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19477",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://bugs.busybox.net/view.php?id=604",
               },
               {
                  name: "25848",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25848",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.avaya.com/elmodocs2/security/ASA-2007-250.htm",
               },
               {
                  name: "RHSA-2007:0244",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2007-0244.html",
               },
               {
                  name: "busybox-passwd-weak-security(25569)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25569",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2005-12-19T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-10T00:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "25098",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25098",
            },
            {
               name: "17330",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/17330",
            },
            {
               name: "oval:org.mitre.oval:def:9483",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9483",
            },
            {
               name: "19477",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19477",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://bugs.busybox.net/view.php?id=604",
            },
            {
               name: "25848",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25848",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.avaya.com/elmodocs2/security/ASA-2007-250.htm",
            },
            {
               name: "RHSA-2007:0244",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2007-0244.html",
            },
            {
               name: "busybox-passwd-weak-security(25569)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25569",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2006-1058",
      datePublished: "2006-04-04T10:00:00",
      dateReserved: "2006-03-07T00:00:00",
      dateUpdated: "2024-08-07T16:56:15.493Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2009-11-16 19:30
Modified
2024-11-21 01:08
Summary
The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.htmlMailing List
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.htmlMailing List
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.htmlMailing List
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.htmlMailing List
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.htmlMailing List
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.htmlMailing List
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.htmlMailing List
cve@mitre.orghttp://osvdb.org/60201Broken Link
cve@mitre.orghttp://secunia.com/advisories/37909Broken Link
cve@mitre.orghttp://secunia.com/advisories/38017Broken Link
cve@mitre.orghttp://secunia.com/advisories/38276Broken Link
cve@mitre.orghttp://secunia.com/advisories/38492Broken Link
cve@mitre.orghttp://secunia.com/advisories/38779Broken Link
cve@mitre.orghttp://support.avaya.com/css/P8/documents/100073666Third Party Advisory
cve@mitre.orghttp://www.debian.org/security/2010/dsa-1996Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2009/11/13/1Mailing List
cve@mitre.orghttp://www.securityfocus.com/bid/37019Broken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.ubuntu.com/usn/usn-864-1Third Party Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=526068Exploit, Issue Tracking
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10310Broken Link
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7540Broken Link
cve@mitre.orghttps://rhn.redhat.com/errata/RHSA-2010-0046.htmlThird Party Advisory
cve@mitre.orghttps://rhn.redhat.com/errata/RHSA-2010-0095.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/60201Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37909Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38017Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38276Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38492Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38779Broken Link
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/css/P8/documents/100073666Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2010/dsa-1996Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/11/13/1Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/37019Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-864-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=526068Exploit, Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10310Broken Link
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7540Broken Link
af854a3a-2127-422b-91ae-364da2661108https://rhn.redhat.com/errata/RHSA-2010-0046.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://rhn.redhat.com/errata/RHSA-2010-0095.htmlThird Party Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8373D74A-0480-4E80-9758-1F35F4904C7E",
                     versionEndIncluding: "2.6.31.6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:redhat:virtualization:5:*:*:*:*:*:*:*",
                     matchCriteriaId: "C029C71B-EB6F-4A45-B138-FE140E100B2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "133AAFA7-AF42-4D7B-8822-AA2E85611BF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD6917D-FE03-487F-9F2C-A79B5FCFBC5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "54D669D4-6D7E-449D-80C1-28FA44F06FFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                     matchCriteriaId: "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                     matchCriteriaId: "7EBFE35C-E243-43D1-883D-4398D71763CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4747CC68-FAF4-482F-929A-9DA6C24CB663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2BCB73E-27BB-4878-AD9C-90C4F20C25A0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C757774-08E7-40AA-B532-6F705C8F7639",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avaya:aura_application_enablement_services:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FE95C9A-4304-48C7-86B9-2E8217DF8872",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:aura_application_enablement_services:5.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9FD6CD5-6401-48F2-9A12-0C999D9EBF23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:aura_communication_manager:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6567360-D041-4C5A-A9DF-39223E5FF895",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:aura_session_manager:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C5F5625-1601-4EFC-B710-58B145F10708",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:aura_session_manager:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB6AB5D8-6E22-483E-A91E-0880FF9A2C97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:aura_sip_enablement_services:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA109EBE-560A-498E-A369-D68B09AFD24E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:aura_system_manager:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "44D546F5-2751-41F0-9442-8F1EB904E294",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:aura_system_manager:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7C82ABC-54B9-454C-A9F9-2DBFF1D62364",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:aura_system_platform:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "76E0FA7D-9F1B-4B1D-8B2D-85D2ED6DC00C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:voice_portal:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5795B04-82E1-4289-BC45-02AEFA0C28F8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42AB65-443B-4655-BAEA-4EB4A43D9509",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBF7B6A8-3DF9-46EC-A90E-6EF68C39F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A01C8B7E-EB19-40EA-B1D2-9AE5EA536C95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*",
                     matchCriteriaId: "1E496249-23A8-42FC-A109-634A54B5600F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*",
                     matchCriteriaId: "CC6C1408-671A-4436-A825-12170CFB5C9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*",
                     matchCriteriaId: "25CBACD3-AFB7-410D-927F-0C1FF477D396",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*",
                     matchCriteriaId: "F13F07CC-739B-465C-9184-0E9D708BD4C7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.",
      },
      {
         lang: "es",
         value: "El fichero poll_mode_io para el controlador megaraid_sas en el kernel de Linux v2.6.31.6 y anteriores tiene permisos de escritura para todos, permitiendo a usuarios locales cambiar el modo de E/S del dispositivo modificando este fichero.",
      },
   ],
   id: "CVE-2009-3939",
   lastModified: "2024-11-21T01:08:33.693",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.6,
               confidentialityImpact: "NONE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 9.2,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2009-11-16T19:30:01.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://osvdb.org/60201",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/37909",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/38017",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/38276",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/38492",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/38779",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://support.avaya.com/css/P8/documents/100073666",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2010/dsa-1996",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://www.openwall.com/lists/oss-security/2009/11/13/1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/37019",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/usn-864-1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Issue Tracking",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=526068",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10310",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7540",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://rhn.redhat.com/errata/RHSA-2010-0046.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://rhn.redhat.com/errata/RHSA-2010-0095.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://osvdb.org/60201",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/37909",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/38017",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/38276",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/38492",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/38779",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://support.avaya.com/css/P8/documents/100073666",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2010/dsa-1996",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://www.openwall.com/lists/oss-security/2009/11/13/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/37019",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/usn-864-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Issue Tracking",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=526068",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10310",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7540",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://rhn.redhat.com/errata/RHSA-2010-0046.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://rhn.redhat.com/errata/RHSA-2010-0095.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vendorComments: [
      {
         comment: "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise Linux 3, as it does not implement the sysfs file system ("/sys/"), through which poll_mode_io file is exposed by the megaraid_sas driver.\n\nIssue was addressed in Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2010-0076.html , https://rhn.redhat.com/errata/RHSA-2010-0046.html and https://rhn.redhat.com/errata/RHSA-2009-1635.html respectively.",
         lastModified: "2010-02-04T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-732",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2006-04-04 10:04
Modified
2024-11-21 00:07
Summary
BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.
References
secalert@redhat.comhttp://bugs.busybox.net/view.php?id=604Broken Link
secalert@redhat.comhttp://secunia.com/advisories/19477Broken Link, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/25098Broken Link
secalert@redhat.comhttp://secunia.com/advisories/25848Broken Link
secalert@redhat.comhttp://support.avaya.com/elmodocs2/security/ASA-2007-250.htmThird Party Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-0244.htmlBroken Link
secalert@redhat.comhttp://www.securityfocus.com/bid/17330Broken Link, Third Party Advisory, VDB Entry
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/25569Third Party Advisory, VDB Entry
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9483Broken Link
af854a3a-2127-422b-91ae-364da2661108http://bugs.busybox.net/view.php?id=604Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19477Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25098Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25848Broken Link
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2007-250.htmThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0244.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/17330Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/25569Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9483Broken Link



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:busybox:busybox:1.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5408DA3E-9CA1-4768-992C-1732A45C4365",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avaya:aura_application_enablement_services:4.01:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA477675-E93D-41F6-A10C-4B6CFBA97C93",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:aura_application_enablement_services:4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DBE1432-359B-4250-8381-E24511D24B14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:aura_sip_enablement_services:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CCDF311-E2C3-4AAC-83D1-44938370FBFD",
                     versionEndExcluding: "5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:message_networking:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D8F6982-2F4D-4D78-92C1-97689D59F3A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avaya:messaging_storage_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AEA45A8-8768-4CB4-8996-91D7F7AEC9F5",
                     versionEndExcluding: "4.0",
                     versionStartIncluding: "3.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.",
      },
      {
         lang: "es",
         value: "BusyBox 1.1.1 no utiliza una \"sal\" cuando genera contraseñas, lo que facilita a usuarios locales adivinar contraseñas a partir de un fichero de contraseñas robado usando técnicas como tablas \"rainbow\".\r\n",
      },
   ],
   id: "CVE-2006-1058",
   lastModified: "2024-11-21T00:07:58.810",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2006-04-04T10:04:00.000",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://bugs.busybox.net/view.php?id=604",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/19477",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/25098",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/25848",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://support.avaya.com/elmodocs2/security/ASA-2007-250.htm",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2007-0244.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/17330",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25569",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9483",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://bugs.busybox.net/view.php?id=604",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/19477",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/25098",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/25848",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://support.avaya.com/elmodocs2/security/ASA-2007-250.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2007-0244.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/17330",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25569",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9483",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vendorComments: [
      {
         comment: "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187385\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here:\nhttp://www.redhat.com/security/updates/classification/\n\nThis issue does not affect Red Hat Enterprise Linux 2.1 or 3.",
         lastModified: "2006-09-19T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-916",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}