IBM Lotus Notes 8 for Linux before 8.0.1 uses (1) unspecified weak permissions for the installation kit obtained through a Notes 8 download and (2) 0777 permissions for the installdata file that is created by setup.sh, which allows local users to gain privileges via a Trojan horse file.
References
Configurations
History
21 Nov 2024, 00:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/40933 - | |
References | () http://osvdb.org/40934 - | |
References | () http://secunia.com/advisories/27860 - Vendor Advisory | |
References | () http://securitytracker.com/id?1019009 - | |
References | () http://www-1.ibm.com/support/docview.wss?uid=swg21289273 - | |
References | () http://www.vupen.com/english/advisories/2007/4037 - |
Information
Published : 2007-12-28 21:46
Updated : 2024-11-21 00:40
NVD link : CVE-2007-6594
Mitre link : CVE-2007-6594
CVE.ORG link : CVE-2007-6594
JSON object : View
Products Affected
ibm
- lotus_notes
CWE
CWE-264
Permissions, Privileges, and Access Controls