CVE-2007-2654 (GCVE-0-2007-2654)
Vulnerability from cvelistv5
Published
2007-05-14 21:00
Modified
2024-08-07 13:49
Severity ?
CWE
  • n/a
Summary
xfs_fsr in xfsdump creates a .fsr temporary directory with insecure permissions, which allows local users to read or overwrite arbitrary files on xfs filesystems.
References
cve@mitre.org http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417894 Exploit
cve@mitre.org http://osvdb.org/36716
cve@mitre.org http://secunia.com/advisories/25220 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/25425 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/25761 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/26867 Vendor Advisory
cve@mitre.org http://www.mandriva.com/security/advisories?name=MDKSA-2007:134
cve@mitre.org http://www.novell.com/linux/security/advisories/2007_10_sr.html Vendor Advisory
cve@mitre.org http://www.securityfocus.com/bid/23922
cve@mitre.org http://www.ubuntu.com/usn/usn-516-1
af854a3a-2127-422b-91ae-364da2661108 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417894 Exploit
af854a3a-2127-422b-91ae-364da2661108 http://osvdb.org/36716
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/25220 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/25425 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/25761 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/26867 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.mandriva.com/security/advisories?name=MDKSA-2007:134
af854a3a-2127-422b-91ae-364da2661108 http://www.novell.com/linux/security/advisories/2007_10_sr.html Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/23922
af854a3a-2127-422b-91ae-364da2661108 http://www.ubuntu.com/usn/usn-516-1
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:49:56.255Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "25761",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25761"
          },
          {
            "name": "23922",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23922"
          },
          {
            "name": "36716",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/36716"
          },
          {
            "name": "26867",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26867"
          },
          {
            "name": "USN-516-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-516-1"
          },
          {
            "name": "25425",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25425"
          },
          {
            "name": "SUSE-SR:2007:010",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_10_sr.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417894"
          },
          {
            "name": "25220",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25220"
          },
          {
            "name": "MDKSA-2007:134",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:134"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-05-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "xfs_fsr in xfsdump creates a .fsr temporary directory with insecure permissions, which allows local users to read or overwrite arbitrary files on xfs filesystems."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-06-01T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "25761",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25761"
        },
        {
          "name": "23922",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23922"
        },
        {
          "name": "36716",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/36716"
        },
        {
          "name": "26867",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26867"
        },
        {
          "name": "USN-516-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-516-1"
        },
        {
          "name": "25425",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25425"
        },
        {
          "name": "SUSE-SR:2007:010",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_10_sr.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417894"
        },
        {
          "name": "25220",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25220"
        },
        {
          "name": "MDKSA-2007:134",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:134"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2654",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "xfs_fsr in xfsdump creates a .fsr temporary directory with insecure permissions, which allows local users to read or overwrite arbitrary files on xfs filesystems."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "25761",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25761"
            },
            {
              "name": "23922",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23922"
            },
            {
              "name": "36716",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/36716"
            },
            {
              "name": "26867",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26867"
            },
            {
              "name": "USN-516-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-516-1"
            },
            {
              "name": "25425",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25425"
            },
            {
              "name": "SUSE-SR:2007:010",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_10_sr.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417894",
              "refsource": "MISC",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417894"
            },
            {
              "name": "25220",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25220"
            },
            {
              "name": "MDKSA-2007:134",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:134"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2654",
    "datePublished": "2007-05-14T21:00:00",
    "dateReserved": "2007-05-14T00:00:00",
    "dateUpdated": "2024-08-07T13:49:56.255Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2007-2654\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-05-14T21:19:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"xfs_fsr in xfsdump creates a .fsr temporary directory with insecure permissions, which allows local users to read or overwrite arbitrary files on xfs filesystems.\"},{\"lang\":\"es\",\"value\":\"xfs_fsr en xfsdump crea un directorio temporal .fsr con permisos no seguros, que permite a usuarios locales leer o sobrescribir archivos arbitrarios en sistemas de archivos xfs.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":4.4,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*\",\"matchCriteriaId\":\"C7EAAD04-D7C4-43DE-B488-1AAD014B503E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"D2E2EF3C-1379-4CBE-8FF5-DACD47834651\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:8.0:*:retail_solution:*:*:*:*:*\",\"matchCriteriaId\":\"9E4D356D-E894-4957-AD61-DA1145CC51FF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB0E2D3B-B50A-46C2-BA1E-3E014DE91954\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"F7446746-87B7-4BD3-AABF-1E0FAA8265AB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*\",\"matchCriteriaId\":\"F239BA8A-6B41-4B08-8C7C-25D235812C50\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*\",\"matchCriteriaId\":\"89BA858B-9466-4640-84AE-DC5BDC65D6B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"56EF103F-5668-4754-A83B-D3662D0CE815\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*\",\"matchCriteriaId\":\"3EA56868-ACA1-4C65-9FFB-A68129D2428A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*\",\"matchCriteriaId\":\"1BA2E629-58C6-4BA0-A447-F8F570B35E74\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"D5F98B9A-880E-45F0-8C16-12B22970F0D1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*\",\"matchCriteriaId\":\"3BEE15E9-9194-4E37-AB3B-66ECD5AC9E11\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*\",\"matchCriteriaId\":\"C89BA3B6-370B-4911-A363-935A9C9EACF5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"B905C6E9-5058-4FD7-95B6-CD6AB6B2F516\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*\",\"matchCriteriaId\":\"4F1B4D15-0562-44D6-B80B-35A8F432BD41\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*\",\"matchCriteriaId\":\"D84ABF78-0D85-4E15-907E-B5ACE86EB8C7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"9C7018E7-F90C-435D-A07A-05A294EA2827\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:10:*:enterprise_desktop:*:*:*:*:*\",\"matchCriteriaId\":\"DC55429E-B607-402D-A491-0EFE7D522F2A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:10:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"C69ED2AB-9E0D-43B3-90F3-E2E10A5B1773\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*\",\"matchCriteriaId\":\"16915004-1006-41D6-9E42-D1A5041E442D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:10.1:*:personal:*:*:*:*:*\",\"matchCriteriaId\":\"6A8AC384-D568-46AA-8B4C-4CCCE472BAA5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:10.1:*:professional:*:*:*:*:*\",\"matchCriteriaId\":\"397B7AE2-248A-4D89-A562-CAA3AD66C862\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:10.2:*:professional:*:*:*:*:*\",\"matchCriteriaId\":\"20C0890B-643B-49C9-B066-8F7D0DF1D0A6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_linux:10.2:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"D9558BE1-6549-44B5-B0C8-1BB57A96C3B7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:suse_united_linux:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EF777CD-BB4F-4F21-A58E-4A42BD7DDE6A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:suse_linux_openexchange_server:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"042AF078-032E-4058-9BB1-362A0AADDD92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:suse_linux_school_server:gold:*:i386:*:*:*:*:*\",\"matchCriteriaId\":\"AB7A069E-9BFA-4DA0-918D-A60CF477D7DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:suse_linux_standard_server:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14B5A54A-07E9-4F28-8D2E-76B41C8F7965\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:suse_open_enterprise_server:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"154457C9-9D8C-4125-A3E4-14A87C36976E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xfsdump:xfsdump:2.2.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2304E36-F58C-42DF-8493-78D423A50546\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:opensuse:10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71A4AF36-9BE4-4083-A70A-E3CE1244A616\"}]}]}],\"references\":[{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417894\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://osvdb.org/36716\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/25220\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25425\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25761\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26867\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:134\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_10_sr.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/23922\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-516-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417894\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://osvdb.org/36716\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25220\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25425\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25761\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26867\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:134\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_10_sr.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/23922\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-516-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…