Lucene search

K
cveDebianCVE-2005-2655
HistoryAug 30, 2005 - 5:03 p.m.

CVE-2005-2655

2005-08-3017:03:00
debian
web.nvd.nist.gov
31
cve-2005-2655
lockmail
maildrop
privilege escalation
local exploit
nvd

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

6.5

Confidence

Low

EPSS

0.001

Percentile

27.5%

lockmail in maildrop before 1.5.3 does not drop privileges before executing commands, which allows local users to gain privileges via command line arguments.

Affected configurations

Nvd
Node
maildropmaildropMatch0.50
OR
maildropmaildropMatch0.51
OR
maildropmaildropMatch0.51b
OR
maildropmaildropMatch0.51c
OR
maildropmaildropMatch0.54
OR
maildropmaildropMatch0.54a
OR
maildropmaildropMatch0.54b
OR
maildropmaildropMatch0.55
OR
maildropmaildropMatch0.55a
OR
maildropmaildropMatch0.55b
OR
maildropmaildropMatch0.55c
OR
maildropmaildropMatch0.60
OR
maildropmaildropMatch0.61
OR
maildropmaildropMatch0.62
OR
maildropmaildropMatch0.63
OR
maildropmaildropMatch0.64
OR
maildropmaildropMatch0.65
OR
maildropmaildropMatch0.70
OR
maildropmaildropMatch0.71
OR
maildropmaildropMatch0.72
OR
maildropmaildropMatch0.73
OR
maildropmaildropMatch0.74
OR
maildropmaildropMatch0.75
OR
maildropmaildropMatch0.76
OR
maildropmaildropMatch0.99.1
OR
maildropmaildropMatch0.99.2
OR
maildropmaildropMatch1.0
OR
maildropmaildropMatch1.1
OR
maildropmaildropMatch1.2
OR
maildropmaildropMatch1.2.1
OR
maildropmaildropMatch1.2.2
OR
maildropmaildropMatch1.3.0
OR
maildropmaildropMatch1.3.1
OR
maildropmaildropMatch1.3.3
OR
maildropmaildropMatch1.3.4
OR
maildropmaildropMatch1.3.5
OR
maildropmaildropMatch1.3.6
OR
maildropmaildropMatch1.3.7
OR
maildropmaildropMatch1.3.8
OR
maildropmaildropMatch1.3.9
OR
maildropmaildropMatch1.4.0
OR
maildropmaildropMatch1.5.0
OR
maildropmaildropMatch1.5.1
OR
maildropmaildropMatch1.5.2
VendorProductVersionCPE
maildropmaildrop0.50cpe:2.3:a:maildrop:maildrop:0.50:*:*:*:*:*:*:*
maildropmaildrop0.51cpe:2.3:a:maildrop:maildrop:0.51:*:*:*:*:*:*:*
maildropmaildrop0.51bcpe:2.3:a:maildrop:maildrop:0.51b:*:*:*:*:*:*:*
maildropmaildrop0.51ccpe:2.3:a:maildrop:maildrop:0.51c:*:*:*:*:*:*:*
maildropmaildrop0.54cpe:2.3:a:maildrop:maildrop:0.54:*:*:*:*:*:*:*
maildropmaildrop0.54acpe:2.3:a:maildrop:maildrop:0.54a:*:*:*:*:*:*:*
maildropmaildrop0.54bcpe:2.3:a:maildrop:maildrop:0.54b:*:*:*:*:*:*:*
maildropmaildrop0.55cpe:2.3:a:maildrop:maildrop:0.55:*:*:*:*:*:*:*
maildropmaildrop0.55acpe:2.3:a:maildrop:maildrop:0.55a:*:*:*:*:*:*:*
maildropmaildrop0.55bcpe:2.3:a:maildrop:maildrop:0.55b:*:*:*:*:*:*:*
Rows per page:
1-10 of 441

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

6.5

Confidence

Low

EPSS

0.001

Percentile

27.5%