Lucene search

K
cve[email protected]CVE-2005-1914
HistoryOct 03, 2022 - 4:22 p.m.

CVE-2005-1914

2022-10-0316:22:43
web.nvd.nist.gov
29
cve-2005-1914
centericq
temporary files
symlink attack
security vulnerability

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

8.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

CenterICQ 4.20.0 and earlier creates temporary files with predictable file names, which allows local users to overwrite arbitrary files via a symlink attack on the gg.token.PID temporary file.

Affected configurations

NVD
Node
centericqcentericqMatch4.5.0.3
OR
centericqcentericqMatch4.5.1
OR
centericqcentericqMatch4.5.1.3
OR
centericqcentericqMatch4.6.0
OR
centericqcentericqMatch4.6.0.3
OR
centericqcentericqMatch4.6.5
OR
centericqcentericqMatch4.6.5.3
OR
centericqcentericqMatch4.6.9
OR
centericqcentericqMatch4.6.9.3
OR
centericqcentericqMatch4.7.1
OR
centericqcentericqMatch4.7.1.3
OR
centericqcentericqMatch4.7.2
OR
centericqcentericqMatch4.7.2.3
OR
centericqcentericqMatch4.7.7
OR
centericqcentericqMatch4.7.7.3
OR
centericqcentericqMatch4.7.8
OR
centericqcentericqMatch4.7.8.3
OR
centericqcentericqMatch4.8.0
OR
centericqcentericqMatch4.8.0.1
OR
centericqcentericqMatch4.8.2
OR
centericqcentericqMatch4.8.2.1
OR
centericqcentericqMatch4.8.3
OR
centericqcentericqMatch4.8.3.1
OR
centericqcentericqMatch4.8.4
OR
centericqcentericqMatch4.8.4.1
OR
centericqcentericqMatch4.8.5
OR
centericqcentericqMatch4.8.5.1
OR
centericqcentericqMatch4.8.6
OR
centericqcentericqMatch4.8.6.1
OR
centericqcentericqMatch4.8.7
OR
centericqcentericqMatch4.8.7.1
OR
centericqcentericqMatch4.8.8
OR
centericqcentericqMatch4.8.8.1
OR
centericqcentericqMatch4.8.9
OR
centericqcentericqMatch4.9.0
OR
centericqcentericqMatch4.9.0.1
OR
centericqcentericqMatch4.9.1
OR
centericqcentericqMatch4.9.1.1
OR
centericqcentericqMatch4.9.2
OR
centericqcentericqMatch4.9.2.1
OR
centericqcentericqMatch4.9.3
OR
centericqcentericqMatch4.9.3.1
OR
centericqcentericqMatch4.9.4
OR
centericqcentericqMatch4.9.4.1
OR
centericqcentericqMatch4.9.5
OR
centericqcentericqMatch4.9.5.1
OR
centericqcentericqMatch4.9.6
OR
centericqcentericqMatch4.9.6.1
OR
centericqcentericqMatch4.9.7
OR
centericqcentericqMatch4.9.7.1
OR
centericqcentericqMatch4.9.8
OR
centericqcentericqMatch4.9.9
OR
centericqcentericqMatch4.9.9.1
OR
centericqcentericqMatch4.9.10
OR
centericqcentericqMatch4.9.10.1
OR
centericqcentericqMatch4.9.11
OR
centericqcentericqMatch4.9.11.1
OR
centericqcentericqMatch4.9.12
OR
centericqcentericqMatch4.9.12.1
OR
centericqcentericqMatch4.10.0.1
OR
centericqcentericqMatch4.11.0.1
OR
centericqcentericqMatch4.12
OR
centericqcentericqMatch4.12.0.1
OR
centericqcentericqMatch4.13
OR
centericqcentericqMatch4.13.0.1
OR
centericqcentericqMatch4.14
OR
centericqcentericqMatch4.14.0.1
OR
centericqcentericqMatch4.20
OR
centericqcentericqMatch4.20.0.1

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

8.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%