IBM Lotus Notes 8 for Linux before 8.0.1 uses (1) unspecified weak permissions for the installation kit obtained through a Notes 8 download and (2) 0777 permissions for the installdata file that is created by setup.sh, which allows local users to gain privileges via a Trojan horse file.
References
Configurations
History
No history.
Information
Published : 2007-12-28 21:46
Updated : 2024-02-04 17:13
NVD link : CVE-2007-6594
Mitre link : CVE-2007-6594
CVE.ORG link : CVE-2007-6594
JSON object : View
Products Affected
ibm
- lotus_notes
CWE
CWE-264
Permissions, Privileges, and Access Controls