ID CVE-2006-6131
Type cve
Reporter cve@mitre.org
Modified 2018-10-17T21:46:00
Description
Untrusted search path vulnerability in (1) WSAdminServer and (2) WSWebServer in Kerio WebSTAR (4D WebSTAR Server Suite) 5.4.2 and earlier allows local users with webstar privileges to gain root privileges via a malicious libucache.dylib helper library in the current working directory.
Successful exploitation requires that the attacker is part of the "admin" group or the "webstar" user.
{"id": "CVE-2006-6131", "bulletinFamily": "NVD", "title": "CVE-2006-6131", "description": "Untrusted search path vulnerability in (1) WSAdminServer and (2) WSWebServer in Kerio WebSTAR (4D WebSTAR Server Suite) 5.4.2 and earlier allows local users with webstar privileges to gain root privileges via a malicious libucache.dylib helper library in the current working directory.\nSuccessful exploitation requires that the attacker is part of the \"admin\" group or the \"webstar\" user.", "published": "2006-11-28T01:07:00", "modified": "2018-10-17T21:46:00", "cvss": {"score": 6.2, "vector": "AV:L/AC:H/Au:N/C:C/I:C/A:C"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-6131", "reporter": "cve@mitre.org", "references": ["http://www.securityfocus.com/bid/21123", "https://exchange.xforce.ibmcloud.com/vulnerabilities/30308", "http://securityreason.com/securityalert/1921", "http://www.securityfocus.com/archive/1/451832/100/200/threaded", "http://secunia.com/advisories/22906", "http://securitytracker.com/id?1017239", "http://www.vupen.com/english/advisories/2006/4539", "http://www.osvdb.org/30450", "http://www.digitalmunition.com/DMA[2006-1115a].txt"], "cvelist": ["CVE-2006-6131"], "type": "cve", "lastseen": "2020-12-09T19:23:49", "edition": 5, "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "osvdb", "idList": ["OSVDB:30450"]}], "modified": "2020-12-09T19:23:49", "rev": 2}, "score": {"value": 5.4, "vector": "NONE", "modified": "2020-12-09T19:23:49", "rev": 2}, "vulnersScore": 5.4}, "cpe": ["cpe:/a:kerio:webstar:5.3.1", "cpe:/a:kerio:webstar:5.2.2", "cpe:/a:kerio:webstar:5.3", "cpe:/a:kerio:webstar:5.2.3", "cpe:/a:kerio:webstar:5.3.2", "cpe:/a:kerio:webstar:5.4", "cpe:/a:kerio:webstar:4.0", "cpe:/a:kerio:webstar:5.3.4", "cpe:/a:kerio:webstar:5.2.1", "cpe:/a:kerio:webstar:5.1.3", "cpe:/a:kerio:webstar:5.3.3", "cpe:/a:kerio:webstar:5.2", "cpe:/a:kerio:webstar:5.1.2", "cpe:/a:kerio:webstar:5.2.4", "cpe:/a:kerio:webstar:5.4.2"], "affectedSoftware": [{"cpeName": "kerio:webstar", "name": "kerio webstar", "operator": "le", "version": "5.4.2"}, {"cpeName": "kerio:webstar", "name": "kerio webstar", "operator": "eq", "version": "5.2.2"}, {"cpeName": "kerio:webstar", "name": "kerio webstar", "operator": "eq", "version": "5.3.3"}, {"cpeName": "kerio:webstar", "name": "kerio webstar", "operator": "eq", "version": "5.4"}, {"cpeName": "kerio:webstar", "name": "kerio webstar", "operator": "eq", "version": "5.2"}, {"cpeName": "kerio:webstar", "name": "kerio webstar", "operator": "eq", "version": "5.2.3"}, {"cpeName": "kerio:webstar", "name": "kerio webstar", "operator": "eq", "version": "5.3.4"}, {"cpeName": "kerio:webstar", "name": "kerio webstar", "operator": "eq", "version": "5.1.3"}, {"cpeName": "kerio:webstar", "name": "kerio webstar", "operator": "eq", "version": "4.0"}, {"cpeName": "kerio:webstar", "name": "kerio webstar", "operator": "eq", "version": "5.1.2"}, {"cpeName": "kerio:webstar", "name": "kerio webstar", "operator": "eq", "version": "5.3.1"}, {"cpeName": "kerio:webstar", "name": "kerio webstar", "operator": "eq", "version": "5.2.4"}, {"cpeName": "kerio:webstar", "name": "kerio webstar", "operator": "eq", "version": "5.3"}, {"cpeName": "kerio:webstar", "name": "kerio webstar", "operator": "eq", "version": "5.3.2"}, {"cpeName": "kerio:webstar", "name": "kerio webstar", "operator": "eq", "version": "5.2.1"}], "cvss2": {"cvssV2": {"accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 1.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:kerio:webstar:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.2.4:*:*:*:*:*:*:*"], "cwe": ["NVD-CWE-Other"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:kerio:webstar:5.2.4:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:kerio:webstar:5.2.2:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:kerio:webstar:5.2.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:kerio:webstar:5.4.2:*:*:*:*:*:*:*", "versionEndIncluding": "5.4.2", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:kerio:webstar:5.3.1:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:kerio:webstar:5.3.4:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:kerio:webstar:5.3.3:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:kerio:webstar:5.1.2:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:kerio:webstar:5.2.3:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:kerio:webstar:5.1.3:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:kerio:webstar:5.2:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:kerio:webstar:5.3.2:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:kerio:webstar:5.4:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:kerio:webstar:4.0:*:*:*:*:*:*:*", "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:kerio:webstar:5.3:*:*:*:*:*:*:*", "vulnerable": true}], "operator": "OR"}]}}
{"osvdb": [{"lastseen": "2017-04-28T13:20:26", "bulletinFamily": "software", "cvelist": ["CVE-2006-6131"], "description": "# No description provided by the source\n\n## References:\nVendor URL: http://www.kerio.com/webstar_home.html\nSecurity Tracker: 1017239\n[Secunia Advisory ID:22906](https://secuniaresearch.flexerasoftware.com/advisories/22906/)\nOther Advisory URL: http://www.digitalmunition.com/DMA%5B2006-1115a%5D.txt\nMail List Post: http://whitestar.linuxbox.org/pipermail/exploits/2006-November/000042.html\nMail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2006-11/0270.html\nISS X-Force ID: 30308\nFrSIRT Advisory: ADV-2006-4539\n[CVE-2006-6131](https://vulners.com/cve/CVE-2006-6131)\nBugtraq ID: 21123\n", "edition": 1, "modified": "2006-11-15T06:34:36", "published": "2006-11-15T06:34:36", "href": "https://vulners.com/osvdb/OSVDB:30450", "id": "OSVDB:30450", "title": "Kerio WebSTAR libucache.dylib Path Subversion Privilege Escalation", "type": "osvdb", "cvss": {"score": 6.2, "vector": "AV:LOCAL/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}