7.5
CVSSv2

CVE-2007-1507

Published: 20/03/2007 Updated: 29/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The default configuration in OpenAFS 1.4.x prior to 1.4.4 and 1.5.x prior to 1.5.17 supports setuid programs within the local cell, which might allow malicious users to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.

Vulnerable Product Search on Vulmon Subscribe to Product

openafs openafs 1.5.16

openafs openafs 1.4.2

openafs openafs 1.5.7

openafs openafs 1.5.8

openafs openafs 1.4.3

openafs openafs 1.4.4

openafs openafs 1.5.2

openafs openafs 1.5.3

openafs openafs 1.5.11

openafs openafs 1.5.12

openafs openafs 1.4.0

openafs openafs 1.4.1

openafs openafs 1.5.5

openafs openafs 1.5.6

openafs openafs 1.5.13

openafs openafs 1.5.14

openafs openafs 1.5.15

openafs openafs 1.5.0

openafs openafs 1.5.1

openafs openafs 1.5.9

openafs openafs 1.5.10

Vendor Advisories

A design error has been identified in the OpenAFS, a cross-platform distributed filesystem included with Debian OpenAFS historically has enabled setuid filesystem support for the local cell However, with its existing protocol, OpenAFS can only use encryption, and therefore integrity protection, if the user is authenticated Unauthenticated access ...