Description
The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1271-1 | New openafs packages fix remote privilege escalation bug |
EUVD |
EUVD-2007-1501 | The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T12:59:08.608Z
Reserved: 2007-03-20T00:00:00.000Z
Link: CVE-2007-1507
No data.
Status : Deferred
Published: 2007-03-20T10:19:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-1507
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD