CVE-1999-1572
Gravedad CVSS v2.0:
BAJA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
16/07/1996
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.
Impacto
Puntuación base 2.0
2.10
Gravedad 2.0
BAJA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:mandrakesoft:mandrake_linux:cs2.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:mandrakesoft:mandrake_linux:cs3.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:ubuntu:ubuntu_linux:4.10:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://marc.info/?l=bugtraq&m=110763404701519&w=2
- http://secunia.com/advisories/14357
- http://secunia.com/advisories/17063
- http://secunia.com/advisories/17532
- http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf
- http://www.debian.org/security/2005/dsa-664
- http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A032
- http://www.redhat.com/support/errata/RHSA-2005-073.html
- http://www.redhat.com/support/errata/RHSA-2005-080.html
- http://www.redhat.com/support/errata/RHSA-2005-806.html
- http://www.trustix.org/errata/2005/0003/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19167
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888
- http://marc.info/?l=bugtraq&m=110763404701519&w=2
- http://secunia.com/advisories/14357
- http://secunia.com/advisories/17063
- http://secunia.com/advisories/17532
- http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf
- http://www.debian.org/security/2005/dsa-664
- http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A032
- http://www.redhat.com/support/errata/RHSA-2005-073.html
- http://www.redhat.com/support/errata/RHSA-2005-080.html
- http://www.redhat.com/support/errata/RHSA-2005-806.html
- http://www.trustix.org/errata/2005/0003/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19167
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888