FKIE_CVE-2005-4660

Vulnerability from fkie_nvd - Published: 2005-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Race condition in IPCop (aka IPCop Firewall) before 1.4.10 might allow local users to overwrite system configuration files and gain privileges by replacing a backup archive during the time window when the archive is owned by "nobody" but not yet encrypted, then executing ipcoprscfg to restore from this backup.
Impacted products
Vendor Product Version
ipcop ipcop 1.4.1
ipcop ipcop 1.4.2
ipcop ipcop 1.4.4
ipcop ipcop 1.4.5
ipcop ipcop 1.4.6
ipcop ipcop 1.4.8
ipcop ipcop 1.4.9

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ipcop:ipcop:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED06B358-E0EF-4E4F-848A-E720ABA78633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ipcop:ipcop:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B204E3C9-131D-40E6-A441-1CBA4E953953",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ipcop:ipcop:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C84B184-A911-46F0-BB7E-D63F401A41CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ipcop:ipcop:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC5966C1-DC13-4C80-AEC8-C64C8B2597DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ipcop:ipcop:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D86E163-5BE5-443D-AEA0-A245A746ED7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ipcop:ipcop:1.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "165FE5EE-4B87-47E1-8198-8097E29FC2A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ipcop:ipcop:1.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B378FA93-43FC-4B83-990B-EB71CDE011C5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Race condition in IPCop (aka IPCop Firewall) before 1.4.10 might allow local users to overwrite system configuration files and gain privileges by replacing a backup archive during the time window when the archive is owned by \"nobody\" but not yet encrypted, then executing ipcoprscfg to restore from this backup."
    }
  ],
  "id": "CVE-2005-4660",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 1.2,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:H/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 1.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://secunia.com/advisories/17513/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1344047\u0026group_id=40604\u0026atid=428516"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/15378"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://secunia.com/advisories/17513/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1344047\u0026group_id=40604\u0026atid=428516"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/15378"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…