CVE-2006-4316 (GCVE-0-2006-4316)

Vulnerability from cvelistv5 – Published: 2006-08-23 22:00 – Updated: 2024-08-07 19:06
VLAI?
Summary
SSH Tectia Management Agent 2.1.2 allows local users to gain root privileges by running a program called sshd, which is obtained from a process listing when the "Restart" action is selected from the Management server GUI, which causes the agent to locate the pathname of the user's program and restart it with root privileges.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.ssh.com/company/news/2006/english/secu… x_refsource_CONFIRM
http://www.securityfocus.com/bid/19677 vdb-entryx_refsource_BID
http://www.osvdb.org/28159 vdb-entryx_refsource_OSVDB
http://securitytracker.com/id?1016744 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/21559 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:06:07.414Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ssh-tectia-restart-privilege-escalation(28561)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28561"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ssh.com/company/news/2006/english/security/article/776/"
          },
          {
            "name": "19677",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19677"
          },
          {
            "name": "28159",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/28159"
          },
          {
            "name": "1016744",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016744"
          },
          {
            "name": "21559",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21559"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-08-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SSH Tectia Management Agent 2.1.2 allows local users to gain root privileges by running a program called sshd, which is obtained from a process listing when the \"Restart\" action is selected from the Management server GUI, which causes the agent to locate the pathname of the user\u0027s program and restart it with root privileges."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ssh-tectia-restart-privilege-escalation(28561)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28561"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ssh.com/company/news/2006/english/security/article/776/"
        },
        {
          "name": "19677",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19677"
        },
        {
          "name": "28159",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/28159"
        },
        {
          "name": "1016744",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016744"
        },
        {
          "name": "21559",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21559"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4316",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SSH Tectia Management Agent 2.1.2 allows local users to gain root privileges by running a program called sshd, which is obtained from a process listing when the \"Restart\" action is selected from the Management server GUI, which causes the agent to locate the pathname of the user\u0027s program and restart it with root privileges."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ssh-tectia-restart-privilege-escalation(28561)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28561"
            },
            {
              "name": "http://www.ssh.com/company/news/2006/english/security/article/776/",
              "refsource": "CONFIRM",
              "url": "http://www.ssh.com/company/news/2006/english/security/article/776/"
            },
            {
              "name": "19677",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19677"
            },
            {
              "name": "28159",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/28159"
            },
            {
              "name": "1016744",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016744"
            },
            {
              "name": "21559",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21559"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4316",
    "datePublished": "2006-08-23T22:00:00",
    "dateReserved": "2006-08-23T00:00:00",
    "dateUpdated": "2024-08-07T19:06:07.414Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_manager:1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53793268-B61F-4730-8786-F22860B1270B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_manager:1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"207A0CC3-240E-467E-A82D-DB9751378C2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_manager:1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23D62693-EA3F-406E-AC66-79B1CD566F1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_manager:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25CE63BE-9056-408C-90D2-6E2CA2E258F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ssh:tectia_manager:2.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CF059D3-7250-44F9-9337-AD66A0F28071\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"SSH Tectia Management Agent 2.1.2 allows local users to gain root privileges by running a program called sshd, which is obtained from a process listing when the \\\"Restart\\\" action is selected from the Management server GUI, which causes the agent to locate the pathname of the user\u0027s program and restart it with root privileges.\"}, {\"lang\": \"es\", \"value\": \"El agente de administraci\\u00f3n de SSH Tectia (SSH Tectia Management Agent 2.1.2) permite a usuarios locales obtener privilegios de root ejecutando un programa con nombre sshd, lo que se consigue mediante un listado de procesos cuando la acci\\u00f3n \\\"Reiniciar\\\" (Restart) se selecciona desde la interfaz gr\\u00e1fica de usuario (GUI) del servidor de administraci\\u00f3n, lo cual provoca que el agente localice el nombre de ruta del programa del usuario y lo reinicie con privilegios de root.\"}]",
      "id": "CVE-2006-4316",
      "lastModified": "2024-11-21T00:15:39.513",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 7.2, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 3.9, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": true, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2006-08-23T22:04:00.000",
      "references": "[{\"url\": \"http://secunia.com/advisories/21559\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1016744\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/28159\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/19677\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ssh.com/company/news/2006/english/security/article/776/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/28561\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/21559\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1016744\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/28159\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/19677\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ssh.com/company/news/2006/english/security/article/776/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/28561\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2006-4316\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-08-23T22:04:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"SSH Tectia Management Agent 2.1.2 allows local users to gain root privileges by running a program called sshd, which is obtained from a process listing when the \\\"Restart\\\" action is selected from the Management server GUI, which causes the agent to locate the pathname of the user\u0027s program and restart it with root privileges.\"},{\"lang\":\"es\",\"value\":\"El agente de administraci\u00f3n de SSH Tectia (SSH Tectia Management Agent 2.1.2) permite a usuarios locales obtener privilegios de root ejecutando un programa con nombre sshd, lo que se consigue mediante un listado de procesos cuando la acci\u00f3n \\\"Reiniciar\\\" (Restart) se selecciona desde la interfaz gr\u00e1fica de usuario (GUI) del servidor de administraci\u00f3n, lo cual provoca que el agente localice el nombre de ruta del programa del usuario y lo reinicie con privilegios de root.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_manager:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53793268-B61F-4730-8786-F22860B1270B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_manager:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"207A0CC3-240E-467E-A82D-DB9751378C2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_manager:1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23D62693-EA3F-406E-AC66-79B1CD566F1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_manager:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25CE63BE-9056-408C-90D2-6E2CA2E258F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ssh:tectia_manager:2.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CF059D3-7250-44F9-9337-AD66A0F28071\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/21559\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1016744\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/28159\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/19677\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ssh.com/company/news/2006/english/security/article/776/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/28561\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/21559\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1016744\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/28159\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/19677\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ssh.com/company/news/2006/english/security/article/776/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/28561\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…