Executive Summary
Summary | |
---|---|
Title | zope privilege escalation |
Informations | |||
---|---|---|---|
Name | DSA-006 | First vendor Publication | 2000-12-19 |
Vendor | Debian | Last vendor Modification | 2000-12-19 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Last week a Zope (security advisory was released which indicated Erik Enge found a problem in the way Zope calculates roles. In some situations Zope checked the wrong folder hierarchy which could cause it to grant local roles when it should not. In other words: users with privileges in one folder could gain privileges in another folder. This has been fixed in version 2.1.6-5.3 by including the 2000-12-15 hotfix, and we recommend that you upgrade your zope package immediately. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. Debian GNU/Linux 2.2 alias potato |
Original Source
Url : http://www.debian.org/security/2000/dsa-006 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-58 | Restful Privilege Elevation |
CWE : Common Weakness Enumeration
% | Id | Name |
---|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 006-1 (zope) File : nvt/deb_006_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
6284 | Zope Local Role Computation Error Privilege Escalation Zope contains a flaw that may allow a malicious user to gain access to unauthorized privileges. In some situations the computation was not climbing the correct hierarchy of folders, granting local roles inappropriately. Exploitation of this issue could grant a local user with privileges in one folder the same privileges specified in another folder. This flaw may lead to a loss of confidentiality and integrity. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-09-06 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2000-086.nasl - Type : ACT_GATHER_INFO |