ID OSVDB:30450
Type osvdb
Reporter OSVDB
Modified 2006-11-15T06:34:36
Description
No description provided by the source
References:
Vendor URL: http://www.kerio.com/webstar_home.html
Security Tracker: 1017239
Secunia Advisory ID:22906
Other Advisory URL: http://www.digitalmunition.com/DMA%5B2006-1115a%5D.txt
Mail List Post: http://whitestar.linuxbox.org/pipermail/exploits/2006-November/000042.html
Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2006-11/0270.html
ISS X-Force ID: 30308
FrSIRT Advisory: ADV-2006-4539
CVE-2006-6131
Bugtraq ID: 21123
{"bulletinFamily": "software", "viewCount": 1, "reporter": "OSVDB", "references": [], "description": "# No description provided by the source\n\n## References:\nVendor URL: http://www.kerio.com/webstar_home.html\nSecurity Tracker: 1017239\n[Secunia Advisory ID:22906](https://secuniaresearch.flexerasoftware.com/advisories/22906/)\nOther Advisory URL: http://www.digitalmunition.com/DMA%5B2006-1115a%5D.txt\nMail List Post: http://whitestar.linuxbox.org/pipermail/exploits/2006-November/000042.html\nMail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2006-11/0270.html\nISS X-Force ID: 30308\nFrSIRT Advisory: ADV-2006-4539\n[CVE-2006-6131](https://vulners.com/cve/CVE-2006-6131)\nBugtraq ID: 21123\n", "affectedSoftware": [], "href": "https://vulners.com/osvdb/OSVDB:30450", "modified": "2006-11-15T06:34:36", "enchantments": {"score": {"value": 6.7, "vector": "NONE", "modified": "2017-04-28T13:20:26", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2006-6131"]}], "modified": "2017-04-28T13:20:26", "rev": 2}, "vulnersScore": 6.7}, "id": "OSVDB:30450", "title": "Kerio WebSTAR libucache.dylib Path Subversion Privilege Escalation", "edition": 1, "published": "2006-11-15T06:34:36", "type": "osvdb", "cvss": {"score": 6.2, "vector": "AV:LOCAL/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "cvelist": ["CVE-2006-6131"], "lastseen": "2017-04-28T13:20:26"}
{"cve": [{"lastseen": "2020-12-09T19:23:49", "description": "Untrusted search path vulnerability in (1) WSAdminServer and (2) WSWebServer in Kerio WebSTAR (4D WebSTAR Server Suite) 5.4.2 and earlier allows local users with webstar privileges to gain root privileges via a malicious libucache.dylib helper library in the current working directory.\nSuccessful exploitation requires that the attacker is part of the \"admin\" group or the \"webstar\" user.", "edition": 5, "cvss3": {}, "published": "2006-11-28T01:07:00", "title": "CVE-2006-6131", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 1.9, "obtainAllPrivilege": true, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.2, "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2006-6131"], "modified": "2018-10-17T21:46:00", "cpe": ["cpe:/a:kerio:webstar:5.3.1", "cpe:/a:kerio:webstar:5.2.2", "cpe:/a:kerio:webstar:5.3", "cpe:/a:kerio:webstar:5.2.3", "cpe:/a:kerio:webstar:5.3.2", "cpe:/a:kerio:webstar:5.4", "cpe:/a:kerio:webstar:4.0", "cpe:/a:kerio:webstar:5.3.4", "cpe:/a:kerio:webstar:5.2.1", "cpe:/a:kerio:webstar:5.1.3", "cpe:/a:kerio:webstar:5.3.3", "cpe:/a:kerio:webstar:5.2", "cpe:/a:kerio:webstar:5.1.2", "cpe:/a:kerio:webstar:5.2.4", "cpe:/a:kerio:webstar:5.4.2"], "id": "CVE-2006-6131", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-6131", "cvss": {"score": 6.2, "vector": "AV:L/AC:H/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:kerio:webstar:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:kerio:webstar:5.2.4:*:*:*:*:*:*:*"]}]}