3.6 Low
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:P/A:P
4.4 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
0.0004 Low
EPSS
Percentile
0.4%
Alertus Desktop Notification for OS X, version 2.9.30.1700 and earlier, sets insecure permissions for configuration and other files, which may enable an unprivileged attacker to disable notifications and modify content locally.
CWE-276: Incorrect Default Permissions - CVE-2016-5087
Alertus Desktop Notification is mass emergency notification software designed to receive and display alerts on PC and Mac client systems. Alertus Desktop Notification for OS X, version 2.9.30.1700 and earlier, sets insecure permissions for configuration and other files by default, which may enable an unprivileged, local attacker to disable notifications and modify content.
A local, unprivileged attacker may modify or remove configuration or other files to disable notifications or alter content.
Apply an update
The vendor has released version 2.9.31.1710 to address this issue. Users are encouraged to update to the latest version.
For users who may be unable or unwilling to upgrade, the vendor has provided the following guidance:
We are providing a script that fixes the permissions if an upgrade cannot be performed. Refer to the URL below for script and more information:
302544
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: May 10, 2016 Updated: June 22, 2016
Statement Date: June 21, 2016
Affected
we are providing a script that fixes the permissions if an upgrade cannot be performed
refer to the URL below for script and more information:
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | 3.2 | AV:L/AC:L/Au:S/C:N/I:P/A:P |
Temporal | 2.6 | E:F/RL:OF/RC:C |
Environmental | 3.0 | CDP:L/TD:M/CR:ND/IR:ND/AR:H |
Thanks to Gerrit DeWitt of Georgia State University for reporting this vulnerability.
This document was written by Joel Land.
CVE IDs: | CVE-2016-5087 |
---|---|
Date Public: | 2016-06-23 Date First Published: |
3.6 Low
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:P/A:P
4.4 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
0.0004 Low
EPSS
Percentile
0.4%