The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2007-03-20 03:19
Updated : 2017-07-28 18:30
NVD link : CVE-2007-1507
Mitre link : CVE-2007-1507
JSON object : View
CWE
CWE-16
Configuration
Products Affected
openafs
- openafs