IBM Lotus Notes 8 for Linux before 8.0.1 uses (1) unspecified weak permissions for the installation kit obtained through a Notes 8 download and (2) 0777 permissions for the installdata file that is created by setup.sh, which allows local users to gain privileges via a Trojan horse file.
References
Configurations
Information
Published : 2007-12-28 13:46
Updated : 2011-03-07 19:03
NVD link : CVE-2007-6594
Mitre link : CVE-2007-6594
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
ibm
- lotus_notes