CVE-2007-1057
Summary
| CVE | CVE-2007-1057 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-02-21 23:28:00 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | The Net Direct client for Linux before 6.0.5 in Nortel Application Switch 2424, VPN 3050 and 3070, and SSL VPN Module 1000 extracts and executes files with insecure permissions, which allows local users to exploit a race condition to replace a world-writable file in /tmp/NetClient and cause another user to execute arbitrary code when attempting to execute this client, as demonstrated by replacing /tmp/NetClient/client. |
Risk And Classification
Primary CVSS: v2.0 6.9 from [email protected]
AV:L/AC:M/Au:N/C:C/I:C/A:C
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
LocalAccess Complexity
MediumAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:L/AC:M/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Nortel | Alteon 2424 Application Switch | 23.2 | All | All | All |
| Application | Nortel | Net Direct Client | All | All | linux | All |
| Hardware | Nortel | Ssl Vpn Module 1000 | All | All | All | All |
| Hardware | Nortel | Vpn Gateway 3070 | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Nortel SSL VPN Net Direct Client Local Privilege Escalation Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Nortel VPN -- UNIX Client local root compromise (spoofed.org) | af854a3a-2127-422b-91ae-364da2661108 | spoofed.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| Nortel: Technical Support: Access Denied | af854a3a-2127-422b-91ae-364da2661108 | www116.nortelnetworks.com | |
| www130.nortelnetworks.com/go/main.jsp | af854a3a-2127-422b-91ae-364da2661108 | www130.nortelnetworks.com | Patch |
| Nortel Net Direct Client for Linux Privilege Escalation - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Nortel SSL VPN Linux Client 6.0.3 - Local Privilege Escalation - Linux local Exploit | af854a3a-2127-422b-91ae-364da2661108 | www.exploit-db.com | |
| osvdb.org/33304 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| SecurityTracker.com Archives - Nortel Net Direct SSL VPN Client Race Condition Lets Local Users Gain Root Privileges | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.