IBM Lotus Notes 8 for Linux prior to 8.0.1 uses (1) unspecified weak permissions for the installation kit obtained through a Notes 8 download and (2) 0777 permissions for the installdata file that is created by setup.sh, which allows local users to gain privileges via a Trojan horse file.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ibm lotus notes |