var-200212-0571
Vulnerability from variot
Norton Internet Security 2001 opens log files with FILE_SHARE_READ and FILE_SHARE_WRITE permissions, which could allow remote attackers to modify the log file contents while Norton Internet Security is running. This is due to the default file system permissions in Windows. Unprivileged users could modify the log file using a File Open Dialog with Win32 API call. The following are the default permissions on the log files folder: Administrators: Full Control Everyone: Change (RWXD) IUSR_ ComputerName : Full Control System: Full Control
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200212-0571", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "internet information server", "scope": "eq", "trust": 1.6, "vendor": "microsoft", "version": "4.0" }, { "model": "internet information services", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "5.0" }, { "model": "norton internet security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2001" }, { "model": "internet information server", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "5.0" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20010" }, { "model": "iis", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "5.0" }, { "model": "iis", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "4.0" } ], "sources": [ { "db": "BID", "id": "3888" }, { "db": "CNNVD", "id": "CNNVD-200212-649" }, { "db": "NVD", "id": "CVE-2002-1695" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Information Anarchy 2K01\u203b advisories@nmrc.org", "sources": [ { "db": "CNNVD", "id": "CNNVD-200212-649" } ], "trust": 0.6 }, "cve": "CVE-2002-1695", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2002-1695", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2002-1695", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200212-649", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-200212-649" }, { "db": "NVD", "id": "CVE-2002-1695" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Norton Internet Security 2001 opens log files with FILE_SHARE_READ and FILE_SHARE_WRITE permissions, which could allow remote attackers to modify the log file contents while Norton Internet Security is running. \nThis is due to the default file system permissions in Windows. Unprivileged users could modify the log file using a File Open Dialog with Win32 API call. \nThe following are the default permissions on the log files folder:\nAdministrators: Full Control\nEveryone: Change (RWXD)\nIUSR_ ComputerName : Full Control\nSystem: Full Control", "sources": [ { "db": "NVD", "id": "CVE-2002-1695" }, { "db": "BID", "id": "3888" } ], "trust": 1.17 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "3888", "trust": 1.9 }, { "db": "NVD", "id": "CVE-2002-1695", "trust": 1.6 }, { "db": "NSFOCUS", "id": "2160", "trust": 0.6 }, { "db": "XF", "id": "7919", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200212-649", "trust": 0.6 } ], "sources": [ { "db": "BID", "id": "3888" }, { "db": "CNNVD", "id": "CNNVD-200212-649" }, { "db": "NVD", "id": "CVE-2002-1695" } ] }, "id": "VAR-200212-0571", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 1.0 }, "last_update_date": "2024-11-22T22:48:44.621000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2002-1695" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.securityfocus.com/bid/3888" }, { "trust": 2.0, "url": "http://online.securityfocus.com/archive/1/250591" }, { "trust": 2.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7919" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/7919" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/2160" }, { "trust": 0.3, "url": "http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/tools/iis4cl.asp" }, { "trust": 0.3, "url": "http://www.microsoft.com/technet/security" }, { "trust": 0.3, "url": "http://www.symantec.com/sabu/nis/nis_pe/" }, { "trust": 0.3, "url": "http://support.microsoft.com/default.aspx?scid=kb;en-us;q315986" } ], "sources": [ { "db": "BID", "id": "3888" }, { "db": "CNNVD", "id": "CNNVD-200212-649" }, { "db": "NVD", "id": "CVE-2002-1695" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "3888" }, { "db": "CNNVD", "id": "CNNVD-200212-649" }, { "db": "NVD", "id": "CVE-2002-1695" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2002-01-16T00:00:00", "db": "BID", "id": "3888" }, { "date": "2002-01-16T00:00:00", "db": "CNNVD", "id": "CNNVD-200212-649" }, { "date": "2002-12-31T05:00:00", "db": "NVD", "id": "CVE-2002-1695" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2002-01-16T00:00:00", "db": "BID", "id": "3888" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200212-649" }, { "date": "2024-11-20T23:41:54.180000", "db": "NVD", "id": "CVE-2002-1695" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200212-649" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vendor products allow non-privileged users to modify log file vulnerabilities", "sources": [ { "db": "CNNVD", "id": "CNNVD-200212-649" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "3888" }, { "db": "CNNVD", "id": "CNNVD-200212-649" } ], "trust": 0.9 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…