ID

VAR-200505-0164


CVE

CVE-2005-0515


TITLE

Webroot My Firewall Local unsafe file creation vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200505-1114

DESCRIPTION

Smc.exe in My Firewall Plus 5.0 build 1117, and possibly other versions, does not drop privileges before launching the Log Viewer export functionality, which allows local users to corrupt arbitrary files by saving log files. A local insecure file creation vulnerability affects Webroot My Firewall. This issue is due to an access validation issue that allows an unprivileged user to create files with escalated privileges. This issue may be exploited by a local attacker to corrupt arbitrary files on an affected computer with SYSTEM privileges. ---------------------------------------------------------------------- Want a new IT Security job? Vacant positions at Secunia: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: My Firewall Plus Arbitrary File Corruption Vulnerability SECUNIA ADVISORY ID: SA13577 VERIFY ADVISORY: http://secunia.com/advisories/13577/ CRITICAL: Not critical IMPACT: Manipulation of data, DoS WHERE: Local system SOFTWARE: My Firewall Plus 5.x http://secunia.com/product/4276/ DESCRIPTION: Secunia Research has discovered a vulnerability in My Firewall Plus, which can be exploited by malicious, local users to manipulate the content of arbitrary files on a vulnerable system. Successful exploitation requires that the user has access to the Log Viewer (all users by default). The vulnerability has been confirmed in version 5.0 (build 1117). Other versions may also be affected. NOTE: This vulnerability has been rated "Not critical" as only trusted users should have access to the configuration and logging functionality. SOLUTION: Update to version 5.0 (build 1119) or apply patch. Patch: http://www.webroot.com/services/mfp_patch.exe Use the "Password Protection" feature to restrict access to the configuration and logging functionality. PROVIDED AND/OR DISCOVERED BY: Carsten Eiram, Secunia Research. ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2004-20/ Webroot: http://www.webroot.com/services/mfp_advisory.php ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2005-0515 // BID: 12842 // VULHUB: VHN-11724 // PACKETSTORM: 36696

AFFECTED PRODUCTS

vendor:webrootmodel:my firewall plusscope:eqversion:5.0

Trust: 1.6

vendor:webrootmodel:software my firewall plusscope:eqversion:5.0

Trust: 0.3

sources: BID: 12842 // CNNVD: CNNVD-200505-1114 // NVD: CVE-2005-0515

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-0515
value: LOW

Trust: 1.0

CNNVD: CNNVD-200505-1114
value: LOW

Trust: 0.6

VULHUB: VHN-11724
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2005-0515
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-11724
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-11724 // CNNVD: CNNVD-200505-1114 // NVD: CVE-2005-0515

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-0515

THREAT TYPE

local

Trust: 1.0

sources: BID: 12842 // PACKETSTORM: 36696 // CNNVD: CNNVD-200505-1114

TYPE

access verification error

Trust: 0.6

sources: CNNVD: CNNVD-200505-1114

EXTERNAL IDS

db:BIDid:12842

Trust: 2.0

db:NVDid:CVE-2005-0515

Trust: 2.0

db:SECUNIAid:13577

Trust: 1.8

db:CNNVDid:CNNVD-200505-1114

Trust: 0.7

db:VULHUBid:VHN-11724

Trust: 0.1

db:PACKETSTORMid:36696

Trust: 0.1

sources: VULHUB: VHN-11724 // BID: 12842 // PACKETSTORM: 36696 // CNNVD: CNNVD-200505-1114 // NVD: CVE-2005-0515

REFERENCES

url:http://www.webroot.com/services/mfp_advisory.php

Trust: 2.1

url:http://www.securityfocus.com/bid/12842

Trust: 1.7

url:http://secunia.com/secunia_research/2004-20/advisory/

Trust: 1.7

url:http://secunia.com/advisories/13577

Trust: 1.7

url:http://www.webroot.com/products/myfirewallplus/

Trust: 0.3

url:http://secunia.com/advisories/13577/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.webroot.com/services/mfp_patch.exe

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/4276/

Trust: 0.1

url:http://secunia.com/secunia_research/2004-20/

Trust: 0.1

sources: VULHUB: VHN-11724 // BID: 12842 // PACKETSTORM: 36696 // CNNVD: CNNVD-200505-1114 // NVD: CVE-2005-0515

CREDITS

Carsten Eiram is credited with the discovery of this issue.

Trust: 0.9

sources: BID: 12842 // CNNVD: CNNVD-200505-1114

SOURCES

db:VULHUBid:VHN-11724
db:BIDid:12842
db:PACKETSTORMid:36696
db:CNNVDid:CNNVD-200505-1114
db:NVDid:CVE-2005-0515

LAST UPDATE DATE

2024-08-14T14:08:51.025000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-11724date:2008-09-05T00:00:00
db:BIDid:12842date:2015-03-19T08:50:00
db:CNNVDid:CNNVD-200505-1114date:2005-10-20T00:00:00
db:NVDid:CVE-2005-0515date:2008-09-05T20:46:31.647

SOURCES RELEASE DATE

db:VULHUBid:VHN-11724date:2005-05-18T00:00:00
db:BIDid:12842date:2005-03-18T00:00:00
db:PACKETSTORMid:36696date:2005-03-22T07:05:55
db:CNNVDid:CNNVD-200505-1114date:2005-05-18T00:00:00
db:NVDid:CVE-2005-0515date:2005-05-18T04:00:00