CVE-2016-8742

The Windows installer that the Apache CouchDB team provides was vulnerable to local privilege escalation. All files in the install inherit the file permissions of the parent directory and therefore a non-privileged user can substitute any executable for the nssm.exe service launcher, or CouchDB batch or binary files. A subsequent service or server restart will then run that binary with administrator privilege. This issue affected CouchDB 2.0.0 (Windows platform only) and was addressed in CouchDB 2.0.0.1.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:apache:couchdb:2.0.0:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:59

Type Values Removed Values Added
References () http://mail-archives.apache.org/mod_mbox/couchdb-dev/201612.mbox/%3C825F65E1-0E5F-4E1F-8053-CF2C6200C526%40apache.org%3E - Vendor Advisory () http://mail-archives.apache.org/mod_mbox/couchdb-dev/201612.mbox/%3C825F65E1-0E5F-4E1F-8053-CF2C6200C526%40apache.org%3E - Vendor Advisory
References () http://www.securityfocus.com/bid/94766 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/94766 - Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/40865/ - Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/40865/ - Third Party Advisory, VDB Entry

Information

Published : 2018-02-12 17:29

Updated : 2024-11-21 02:59


NVD link : CVE-2016-8742

Mitre link : CVE-2016-8742

CVE.ORG link : CVE-2016-8742


JSON object : View

Products Affected

apache

  • couchdb

microsoft

  • windows
CWE
CWE-264

Permissions, Privileges, and Access Controls