Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) in EMC Avamar Server before 7.3.0-233 use weak permissions for unspecified directories, which allows local users to obtain root access by replacing a script with a Trojan horse program.
References
Link | Resource |
---|---|
http://seclists.org/bugtraq/2016/Sep/31 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/93032 | |
http://www.securitytracker.com/id/1036844 | |
http://seclists.org/bugtraq/2016/Sep/31 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/93032 | |
http://www.securitytracker.com/id/1036844 |
Configurations
History
21 Nov 2024, 02:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/bugtraq/2016/Sep/31 - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/93032 - | |
References | () http://www.securitytracker.com/id/1036844 - |
Information
Published : 2016-09-21 02:59
Updated : 2024-11-21 02:42
NVD link : CVE-2016-0921
Mitre link : CVE-2016-0921
CVE.ORG link : CVE-2016-0921
JSON object : View
Products Affected
emc
- avamar_server
CWE
CWE-264
Permissions, Privileges, and Access Controls