CVE-2006-4315
Published Aug 23, 2006
Last updated 7 years ago
Overview
- Description
- Unquoted Windows search path vulnerability in multiple SSH Tectia products, including Client/Server/Connector 5.0.0 and 5.0.1 and Client/Server before 4.4.5, and Manager 2.12 and earlier, when running on Windows, might allow local users to gain privileges via a malicious program file under "Program Files" or its subdirectories.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ssh:tectia_client:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6693DC2D-CDA1-4E37-9569-58874F55A48A" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16CDE975-9E08-493B-9385-3EC2CABC4A15" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A63EA6B-2400-48C4-924D-3509971CCBEE" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0658F08E-2596-4D8E-91AA-44A9DBE8F151" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74169893-A34F-49FB-8C83-36C4AA808925" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "013E94CC-AF68-44D0-826F-28B1825A8DA0" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9981E30-0D54-4464-8287-E450E7E8F770" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4ED17577-F56D-48DF-8863-B4FF039C47D7" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B74A91E2-C93E-49F4-B349-8E4CEC285C03" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.1j:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBF7244A-BFF7-4C7C-82FF-6B53236DB86D" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BADA4CC-FC94-427A-AF93-9AAFDAADDB91" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F1D6B7F-8B52-42C0-8613-740CACFB3463" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5024EC6-2A47-4ACE-A661-B78D314C7D0F" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA64A6E8-0EB7-4BCA-A7AA-245A466C2F22" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5058DC44-835D-4BD9-B550-E5CB22F6475F" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23ED4911-6CF5-4562-B421-A328D7BE0291" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.8k:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7F3388A-39FA-4A3A-819A-764A16AAEB54" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81DDF3D8-35EA-4677-B1AC-1CA674EEBCD3" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F37366E9-F1B6-4458-AE1C-790405AC8740" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C727829-5E3A-41F6-BAB3-01AED39674D1" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1CF57477-FB53-49CC-BAD4-CDC0FD9363F5" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65FB72FC-37EE-4D42-893E-9C0924EEA2E5" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B18D681B-ACE1-47E3-851D-57DA47D1E2F4" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F470797-BBE4-4360-A38A-2722B8CF3BB5" }, { "criteria": "cpe:2.3:a:ssh:tectia_client:5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB6587AA-E91D-4194-81D0-FCF1AA382CAB" }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D921A61E-D401-404E-B539-DAFE05D001F7" }, { "criteria": "cpe:2.3:a:ssh:tectia_connector:5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30A3B9E9-3643-443B-A19A-2AE989832C50" }, { "criteria": "cpe:2.3:a:ssh:tectia_manager:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "207A0CC3-240E-467E-A82D-DB9751378C2D" }, { "criteria": "cpe:2.3:a:ssh:tectia_manager:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23D62693-EA3F-406E-AC66-79B1CD566F1C" }, { "criteria": "cpe:2.3:a:ssh:tectia_manager:2.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CF059D3-7250-44F9-9337-AD66A0F28071" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E4480D2-1B5C-443D-8D7F-976885C33BDA" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "795DEA94-79D6-4132-B205-AB098E92216A" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD05A3E8-105D-4712-8BBE-2D5CF4F78890" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D6691FF-77F2-4AE3-B49F-BFB8744AD046" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "075B6E8D-4C4B-4E98-94C6-52B842BE65FA" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27B99F6E-712C-4205-9185-26F543EFC881" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0AF0262B-1451-40CA-9DD1-F2DEA793BD61" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C27E0224-9431-49EF-8B32-850CDF6FFFE4" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88A88A21-7427-4452-8C2A-6C31542FA83C" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3DCEAA0-509A-4978-BE53-0CBE084366FF" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3203DC73-05F2-4A28-9E62-3D87B482586A" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BDA1AAC-3FCF-47D8-A6B4-9DB0D776CE14" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64F4CDF1-695A-4677-A829-74BB365BF4FA" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBEF55DD-FC87-42A3-9DAF-9862AA9649CB" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC0FA974-7671-4FB7-BB36-274B5970EBAB" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6C2BA84-A520-489E-AF08-F3D35B0D580B" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "011F841A-4F1B-49B2-B379-9FE126141568" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:4.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3C54819-CF51-4BBE-873F-4A0E2072D10F" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "802C46F0-0FE2-42BD-910A-08CC9639BC4E" }, { "criteria": "cpe:2.3:a:ssh:tectia_server:5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B2E96C8-F8F8-4002-B242-3ADDF1E84B7D" } ], "operator": "OR" } ] } ]