fkie_cve-2007-1505
Vulnerability from fkie_nvd
Published
2007-03-19 22:19
Modified
2025-04-09 00:30
Severity ?
Summary
Fujitsu FENCE-Pro before V5L01, and Systemwalker Desktop Encryption V12.0L10, V12.0L10A, V12.0L10B, V12.0L20 and V13.0.0 allows local users to obtain sensitive information by extracting the decoding password from certain "self-decoding" file types.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:fujitsu:fence:2:*:pro:*:*:*:*:*",
              "matchCriteriaId": "7C5E4212-6D41-4B9D-B48F-306DBF6C27A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fujitsu:fence:3:*:pro:*:*:*:*:*",
              "matchCriteriaId": "C3C79CE4-A688-43FB-91B7-047E0569C69B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fujitsu:fence:4:*:pro:*:*:*:*:*",
              "matchCriteriaId": "0AB3758C-142E-46AB-AD3B-4DED11141E5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fujitsu:systemwalker_desktop_encryption:v12.0l10:*:*:*:*:*:*:*",
              "matchCriteriaId": "89EC1C32-D2EA-47E0-8BE8-A5772AC41B84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fujitsu:systemwalker_desktop_encryption:v12.0l10a:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0B28FB-98B9-4153-B1FD-0C048A0020E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fujitsu:systemwalker_desktop_encryption:v12.0l10b:*:*:*:*:*:*:*",
              "matchCriteriaId": "59431872-FB05-411F-91AF-DF514B155569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fujitsu:systemwalker_desktop_encryption:v12.0l20:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E54656C-9B01-408C-90FC-96B59DE39A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:fujitsu:systemwalker_desktop_encryption:v13.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "578CD7A3-42B2-49FE-A2E8-D58C5558DF69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Fujitsu FENCE-Pro before V5L01, and Systemwalker Desktop Encryption V12.0L10, V12.0L10A, V12.0L10B, V12.0L20 and V13.0.0 allows local users to obtain sensitive information by extracting the decoding password from certain \"self-decoding\" file types."
    },
    {
      "lang": "es",
      "value": "Fujitsu FENCE-Pro versiones anteriores a V5L01, y Systemwalker Desktop Encryption versiones V12.0L10, V12.0L10A, V12.0L10B, V12.0L20 y V13.0.0, permite a usuarios locales obtener informaci\u00f3n confidencial extrayendo la contrase\u00f1a de descodificaci\u00f3n de ciertos tipos de archivos \"self-decoding\"."
    }
  ],
  "id": "CVE-2007-1505",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-03-19T22:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://jvn.jp/jp/JVN%2319795972/index.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/34184"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24537"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24549"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://segroup.fujitsu.com/secure/products/fence/notice/alert20070316.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://software.fujitsu.com/jp/security/products-fujitsu/solution/systemwalker_dte_200701.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/23001"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33029"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/jp/JVN%2319795972/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/34184"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24537"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24549"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://segroup.fujitsu.com/secure/products/fence/notice/alert20070316.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://software.fujitsu.com/jp/security/products-fujitsu/solution/systemwalker_dte_200701.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/23001"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33029"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…