Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2005-1976 | First vendor Publication | 2005-12-31 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:S/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 1.7 | Attack Range | Local |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 3.1 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
Novell NetMail 3.5.2a, 3.5.2b, and 3.5.2c, when running on Linux, sets the owner and group ID to 500 for certain files, which could allow users or groups with that ID to execute arbitrary code or cause a denial of service by modifying those files. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1976 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
17456 | Novell NetMail for Linux Group File Ownership Local Privilege Escalation Novell NetMail for Linux contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered because the files in the Linux distribution of the NetMail has the owner ID and group ID set to 500. If NetMail is installed on a system where user ID 500 exists or where users belong to group ID 500, these users could delete or replace the netmail binaries, resulting in a loss of integrity. |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:21:12 |
|
2024-11-28 12:07:11 |
|
2021-05-04 12:03:01 |
|
2021-04-22 01:03:17 |
|
2020-05-23 00:16:38 |
|
2016-06-28 15:19:27 |
|
2016-04-26 13:36:54 |
|
2013-05-11 11:27:37 |
|