6.4 Medium
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.028 Low
EPSS
Percentile
90.5%
The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.
secunia.com/advisories/24582
secunia.com/advisories/24599
secunia.com/advisories/24607
secunia.com/advisories/24720
security.gentoo.org/glsa/glsa-200704-03.xml
www.debian.org/security/2007/dsa-1271
www.mandriva.com/security/advisories?name=MDKSA-2007:066
www.openafs.org/pipermail/openafs-announce/2007/000185.html
www.openafs.org/pipermail/openafs-announce/2007/000186.html
www.openafs.org/pipermail/openafs-announce/2007/000187.html
www.securityfocus.com/bid/23060
www.securitytracker.com/id?1017807
www.vupen.com/english/advisories/2007/1033
exchange.xforce.ibmcloud.com/vulnerabilities/33180