IBM Lotus Notes 8 for Linux before 8.0.1 uses (1) unspecified weak permissions for the installation kit obtained through a Notes 8 download and (2) 0777 permissions for the installdata file that is created by setup.sh, which allows local users to gain privileges via a Trojan horse file.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://osvdb.org/40933 | vdb entry |
http://www.vupen.com/english/advisories/2007/4037 | vdb entry |
http://securitytracker.com/id?1019009 | vdb entry |
http://osvdb.org/40934 | vdb entry |
http://secunia.com/advisories/27860 | third party advisory vendor advisory |
http://www-1.ibm.com/support/docview.wss?uid=swg21289273 |