The installation of Cisco Secure Desktop (CSD) before 3.1.1.45 uses insecure default permissions (all users full control) for the CSD directory and its parent directory, which allow local users to gain privileges by replacing CSD executables, aka "Local Privilege Escalation".
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=442 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/22747 - | |
References | () http://securitytracker.com/id?1017195 - | |
References | () http://www.cisco.com/warp/public/707/cisco-sa-20061108-csd.shtml - Patch | |
References | () http://www.osvdb.org/30308 - | |
References | () http://www.securityfocus.com/bid/20964 - | |
References | () http://www.vupen.com/english/advisories/2006/4409 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30128 - |
Information
Published : 2006-11-08 22:07
Updated : 2024-11-21 00:20
NVD link : CVE-2006-5808
Mitre link : CVE-2006-5808
CVE.ORG link : CVE-2006-5808
JSON object : View
Products Affected
cisco
- secure_desktop
CWE