CVE-2006-0055
Published Jan 11, 2006
Last updated 7 years ago
Overview
- Description
- The ispell_op function in ee on FreeBSD 4.10 to 6.0 uses predictable filenames and does not confirm which file is being written, which allows local users to overwrite arbitrary files via a symlink attack when ee invokes ispell.
- Source
- secteam@freebsd.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FFD9D1C-A459-47AD-BC62-15631417A32F" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4ECDEC87-0132-46B6-BD9B-A94F9B669EAA" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E21E50A-A368-4487-A791-87366CC5C86E" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43E84296-9B5C-4623-A2C4-431D76FC2765" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E18328E2-3CB5-4D36-8EA3-77DD909B46A3" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF73D76B-FBB8-4D10-8393-9FAF53392A4B" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F177AE1C-58C2-4575-807C-ABFFC5119FA8" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61EBA52A-2D8B-4FB5-866E-AE67CE1842E7" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B13D898-C1B6-44B9-8432-7DDB8A380E9E" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51A612F6-E4EB-4E34-8F55-79E16C74758E" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C19B266-8FE7-49ED-8678-2D522257491D" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15C4D826-A419-45F5-B91C-1445DB480916" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D9F2B04-A1F2-4788-A53D-C8274A758DDA" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEC7B38F-C6FB-4213-AE18-2D039A4D8E7A" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A5309ED-D84F-4F52-9864-5B0FEEEE5022" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD7C441E-444B-4DF5-8491-86805C70FB99" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E4BC012-ADE4-468F-9A25-261CD8055694" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8A80E6A-6502-4A33-83BA-7DCC606D79AA" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D6428EB-5E1A-41CB-979C-4C9402251D8B" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DCA9879-C9F5-475A-8EC9-04D151001C8D" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A94132F-4C47-49CC-B03C-8756613E9A38" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46A60ED5-1D92-4B40-956F-D1801CAB9039" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F629879-66F0-427B-86D8-D740E0E3F6E8" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C89129C5-A1DB-4018-B43A-C60C8E650080" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.0:release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCE4F2E6-2286-4D87-ADD7-7E999B4E5620" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.0:stable:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C07C3BEF-8D6A-4F23-96DE-AFE4369D08EF" } ], "operator": "OR" } ] } ]