Vulnerability Details : CVE-2008-0884
The Replace function in the capp-lspp-config script in the (1) lspp-eal4-config-ibm and (2) capp-lspp-eal4-config-hp packages before 0.65-2 in Red Hat Enterprise Linux (RHEL) 5 uses lstat instead of stat to determine the /etc/pam.d/system-auth file permissions, leading to a change to world-writable permissions for the /etc/pam.d/system-auth-ac file, which allows local users to gain privileges by modifying this file.
Products affected by CVE-2008-0884
- cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-0884
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 14 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-0884
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST |
CWE ids for CVE-2008-0884
-
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-0884
-
http://securitytracker.com/id?1019740
Third Party Advisory;VDB Entry
-
https://bugzilla.redhat.com/show_bug.cgi?id=435442
Issue Tracking;Vendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2008-0193.html
Third Party Advisory
-
http://www.securityfocus.com/bid/28557
Third Party Advisory;VDB Entry
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41584
Third Party Advisory;VDB Entry
Jump to