MDaemon 9.0.5, 9.0.6, 9.51, and 9.53, and possibly other versions, installs the MDaemon application folder with insecure permissions (Users create files/directories), which allows local users to execute arbitrary code by creating malicious RASAPI32.DLL or MPRAPI.DLL libraries in the MDaemon\APP folder, which is an untrusted search path element due to insecure permissions.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/21554 - | |
References | () http://secunia.com/secunia_research/2006-67/advisory/ - Vendor Advisory | |
References | () http://securityreason.com/securityalert/1890 - | |
References | () http://securitytracker.com/id?1017238 - | |
References | () http://www.securityfocus.com/archive/1/451821/100/100/threaded - | |
References | () http://www.vupen.com/english/advisories/2006/4538 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30331 - |
Information
Published : 2006-11-17 22:07
Updated : 2024-11-21 00:21
NVD link : CVE-2006-5968
Mitre link : CVE-2006-5968
CVE.ORG link : CVE-2006-5968
JSON object : View
Products Affected
alt-n
- mdaemon
CWE