It has been reported that the permissions set by default on the files and directories comprising InterSystems Cache are insecure. The permissions on directories allegedly allow for any user to overwrite any file. This creates many opportunities for local attackers to obtain root privileges.
Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.
This vulnerability requires local access to exploit. Do not provide user accounts on critical systems such as database servers to any but the most trusted individuals. If local access is necessary, use restricted shells or other mechanisms to prevent access to sensitive areas of the system.
Evaluate read, write, and execute permissions on all newly installed software.
Ensure that all software packages set permissions appropriately at install time. Change the permissions, if possible, if they do not. Doing so may prevent insecure default configurations such as this from being exploited by malicious local users.
The vendor has released versions 5.0.3 and 4.1.16 to address this issue. Please contact the vendor for further information on obtaining fixed versions of affected packages.