CVE-2007-1057
Summary
| CVE | CVE-2007-1057 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-02-21 23:28:00 UTC |
| Updated | 2017-10-11 01:31:00 UTC |
| Description | The Net Direct client for Linux before 6.0.5 in Nortel Application Switch 2424, VPN 3050 and 3070, and SSL VPN Module 1000 extracts and executes files with insecure permissions, which allows local users to exploit a race condition to replace a world-writable file in /tmp/NetClient and cause another user to execute arbitrary code when attempting to execute this client, as demonstrated by replacing /tmp/NetClient/client. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Nortel | Alteon 2424 Application Switch | 23.2 | All | All | All |
| Hardware | Nortel | Alteon 2424 Application Switch | 23.2 | All | All | All |
| Application | Nortel | Net Direct Client | All | All | linux | All |
| Hardware | Nortel | Ssl Vpn Module 1000 | All | All | All | All |
| Hardware | Nortel | Ssl Vpn Module 1000 | All | All | All | All |
| Hardware | Nortel | Vpn Gateway 3070 | All | All | All | All |
| Hardware | Nortel | Vpn Gateway 3070 | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 33304 | OSVDB | osvdb.org | |
| www130.nortelnetworks.com/go/main.jsp | CONFIRM | www130.nortelnetworks.com | Patch |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| Nortel SSL VPN Net Direct Client Local Privilege Escalation Vulnerability | BID | www.securityfocus.com | |
| Nortel SSL VPN Linux Client 6.0.3 - Local Privilege Escalation - Linux local Exploit | EXPLOIT-DB | www.exploit-db.com | |
| SecurityTracker.com Archives - Nortel Net Direct SSL VPN Client Race Condition Lets Local Users Gain Root Privileges | SECTRACK | www.securitytracker.com | |
| Nortel VPN -- UNIX Client local root compromise (spoofed.org) | MISC | spoofed.org | |
| Nortel Net Direct Client for Linux Privilege Escalation - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| Nortel: Technical Support: Access Denied | CONFIRM | www116.nortelnetworks.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.