CVE-1999-1572
Published Jul 16, 1996
Last updated 7 years ago
Overview
- Description
- cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- -
- Impact
- -
- Solution
- -
Vendor comments
- Red HatRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CAE037F-111C-4A76-8FFE-716B74D65EF3" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27C9E23D-AB82-4AE1-873E-C5493BB96AA1" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4177C378-7729-46AB-B49B-C6DAED3200E7" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3528DABD-B821-4D23-AE12-614A9CA92C46" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:cs2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5B3DB31-3998-4B75-A972-0F2675ACCA2C" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:cs3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37145402-6EC5-4700-8863-CE563A4F37F5" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9440B25-D206-4914-9557-B5F030890DEC" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9933557-3BCA-4D92-AD4F-27758A0D3347" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10A60552-15A5-4E95-B3CE-99A4B26260C1" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D74A418-50F0-42C0-ABBC-BBBE718FF025" }, { "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C62EF915-CA7C-4D75-BC67-E015772BB9CF" } ], "operator": "OR" } ] } ]