| |
Vulnerability CVE-2009-4211
Published: 2009-12-04 Modified: 2012-02-13
Description: |
The U.S. Defense Information Systems Agency (DISA) Security Readiness Review (SRR) script for the Solaris x86 platform executes files in arbitrary directories as root for filenames equal to (1) java, (2) openssl, (3) php, (4) snort, (5) tshark, (6) vncserver, or (7) wireshark, which allows local users to gain privileges via a Trojan horse program. |
See advisories in our WLB2 database: | Topic | Author | Date |
High |
| Frank Stuart (fs... | 08.12.2009 |
Type:
CWE-264 (Permissions, Privileges, and Access Controls)
CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
9.3/10 |
10/10 |
8.6/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Medium |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
Complete |
Complete |
Complete |
References: |
http://securitytracker.com/id?1023265
http://www.kb.cert.org/vuls/id/433821
http://www.securityfocus.com/archive/1/508188/100/0/threaded
http://www.securityfocus.com/bid/37200
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|