6.9
CVSSv2

CVE-2007-1057

Published: 21/02/2007 Updated: 11/10/2017
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
VMScore: 695
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The Net Direct client for Linux prior to 6.0.5 in Nortel Application Switch 2424, VPN 3050 and 3070, and SSL VPN Module 1000 extracts and executes files with insecure permissions, which allows local users to exploit a race condition to replace a world-writable file in /tmp/NetClient and cause another user to execute arbitrary code when attempting to execute this client, as demonstrated by replacing /tmp/NetClient/client.

Vulnerable Product Search on Vulmon Subscribe to Product

nortel net_direct_client

Exploits

#!/bin/sh # # Nortel SSL VPN Linux Client race condition # # Jon Hart <jhart@spoofedorg> # # The Linux client that is utilized by versions priot to 605 of the Nortel # SSL VPN appliance suffers from a number of problems that, in combination, # allow an unprivileged local user to obtain root privileges # # This particular bug is as foll ...