{"api_version":"1","generated_at":"2026-04-24T22:08:37+00:00","cve":"CVE-2006-4842","urls":{"html":"https://cve.report/CVE-2006-4842","api":"https://cve.report/api/cve/CVE-2006-4842.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-4842","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-4842"},"summary":{"title":"CVE-2006-4842","description":"The Netscape Portable Runtime (NSPR) API 4.6.1 and 4.6.2, as used in Sun Solaris 10, trusts user-specified environment variables for specifying log files even when running from setuid programs, which allows local users to create or overwrite arbitrary files.","state":"PUBLISHED","assigner":"mitre","published_at":"2006-10-12 00:07:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["CWE-20","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"3.6","severity":"","vector":"AV:L/AC:L/Au:N/C:N/I:P/A:P","data":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:P","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102658-1","name":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102658-1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"#102658: Security Vulnerability in the Netscape Portable Runtime (NSPR) API Affects Solaris","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/20471","name":"http://www.securityfocus.com/bid/20471","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Sun Solaris Netscape Portable Runtime API Local Privilege Escalation Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.vupen.com/english/advisories/2006/4016","name":"http://www.vupen.com/english/advisories/2006/4016","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=418","name":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=418","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Public Advisory: 10.11.06 // iDefense Labs","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://www.exploit-db.com/exploits/45433/","name":"https://www.exploit-db.com/exploits/45433/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Solaris - libnspr NSPR_LOG_FILE Privilege Escalation (Metasploit) - Solaris local Exploit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1819","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1819","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22348","name":"http://secunia.com/advisories/22348","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Solaris Netscape Portable Runtime Privilege Escalation - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29489","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29489","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1017050","name":"http://securitytracker.com/id?1017050","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Netscape Portable Runtime API Environment Variable Lets Local Users Create Arbitrary Files - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/448691/100/0/threaded","name":"http://www.securityfocus.com/archive/1/448691/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-4842","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-4842","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"4842","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netscape","cpe5":"portable_runtime_api","cpe6":"4.6.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"4842","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netscape","cpe5":"portable_runtime_api","cpe6":"4.6.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"4842","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"sun","cpe5":"solaris","cpe6":"10.0","cpe7":"*","cpe8":"sparc","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[{"cvename":"CVE-2006-4842","organization":"Red Hat","lastmodified":"2007-01-11","contributor":"Mark J Cox","statementText":"This issue also affects other OS that use NSPR. However, Red Hat does not ship any application linked setuid or setgid against NSPR and therefore is not vulnerable to this issue.","cve_year":"2006","cve_id":"4842","crc32":"7a4d2f16"}],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T19:23:41.272Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"20471","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/20471"},{"name":"ADV-2006-4016","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/4016"},{"name":"20061011 Sun Microsystems Solaris NSPR Library Arbitrary File Creation Vulnerability","tags":["third-party-advisory","x_refsource_IDEFENSE","x_transferred"],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=418"},{"name":"20061013 Re: iDefense Security Advisory 10.11.06: Sun Microsystems Solaris NSPR Library Arbitrary File Creation Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/448691/100/0/threaded"},{"name":"45433","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/45433/"},{"name":"nspr-api-file-create(29489)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29489"},{"name":"22348","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22348"},{"name":"oval:org.mitre.oval:def:1819","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1819"},{"name":"102658","tags":["vendor-advisory","x_refsource_SUNALERT","x_transferred"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102658-1"},{"name":"1017050","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1017050"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-10-11T00:00:00.000Z","descriptions":[{"lang":"en","value":"The Netscape Portable Runtime (NSPR) API 4.6.1 and 4.6.2, as used in Sun Solaris 10, trusts user-specified environment variables for specifying log files even when running from setuid programs, which allows local users to create or overwrite arbitrary files."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-17T20:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"20471","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/20471"},{"name":"ADV-2006-4016","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/4016"},{"name":"20061011 Sun Microsystems Solaris NSPR Library Arbitrary File Creation Vulnerability","tags":["third-party-advisory","x_refsource_IDEFENSE"],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=418"},{"name":"20061013 Re: iDefense Security Advisory 10.11.06: Sun Microsystems Solaris NSPR Library Arbitrary File Creation Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/448691/100/0/threaded"},{"name":"45433","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/45433/"},{"name":"nspr-api-file-create(29489)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29489"},{"name":"22348","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22348"},{"name":"oval:org.mitre.oval:def:1819","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1819"},{"name":"102658","tags":["vendor-advisory","x_refsource_SUNALERT"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102658-1"},{"name":"1017050","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1017050"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-4842","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Netscape Portable Runtime (NSPR) API 4.6.1 and 4.6.2, as used in Sun Solaris 10, trusts user-specified environment variables for specifying log files even when running from setuid programs, which allows local users to create or overwrite arbitrary files."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"20471","refsource":"BID","url":"http://www.securityfocus.com/bid/20471"},{"name":"ADV-2006-4016","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/4016"},{"name":"20061011 Sun Microsystems Solaris NSPR Library Arbitrary File Creation Vulnerability","refsource":"IDEFENSE","url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=418"},{"name":"20061013 Re: iDefense Security Advisory 10.11.06: Sun Microsystems Solaris NSPR Library Arbitrary File Creation Vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/448691/100/0/threaded"},{"name":"45433","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/45433/"},{"name":"nspr-api-file-create(29489)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29489"},{"name":"22348","refsource":"SECUNIA","url":"http://secunia.com/advisories/22348"},{"name":"oval:org.mitre.oval:def:1819","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1819"},{"name":"102658","refsource":"SUNALERT","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102658-1"},{"name":"1017050","refsource":"SECTRACK","url":"http://securitytracker.com/id?1017050"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2006-4842","datePublished":"2006-10-12T00:00:00.000Z","dateReserved":"2006-09-15T00:00:00.000Z","dateUpdated":"2024-08-07T19:23:41.272Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2006-10-12 00:07:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["CWE-20","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:P","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:portable_runtime_api:4.6.1:*:*:*:*:*:*:*","matchCriteriaId":"AB613FE8-2543-4182-A191-CE6F3238348B"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:portable_runtime_api:4.6.2:*:*:*:*:*:*:*","matchCriteriaId":"8F312890-81F2-44DE-83D9-554532019872"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*","matchCriteriaId":"7BF232A9-9E0A-481E-918D-65FC82EF36D8"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"4842","Ordinal":"1","Title":"CVE-2006-4842","CVE":"CVE-2006-4842","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"4842","Ordinal":"1","NoteData":"The Netscape Portable Runtime (NSPR) API 4.6.1 and 4.6.2, as used in Sun Solaris 10, trusts user-specified environment variables for specifying log files even when running from setuid programs, which allows local users to create or overwrite arbitrary files.","Type":"Description","Title":"CVE-2006-4842"},{"CveYear":"2006","CveId":"4842","Ordinal":"2","NoteData":"2006-10-11","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"4842","Ordinal":"3","NoteData":"2018-10-17","Type":"Other","Title":"Modified"}]}}}