4.4

CVE-2007-2654

Exploit

xfs_fsr in xfsdump creates a .fsr temporary directory with insecure permissions, which allows local users to read or overwrite arbitrary files on xfs filesystems.

Data is provided by the National Vulnerability Database (NVD)
SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
   SuseSuse Linux Version1.0 Editiondesktop
SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
   SuseSuse Linux Version8 Editionenterprise_server
SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
   SuseSuse Linux Version9.0 Editionenterprise_server
SuseSuse Linux School Server Versiongold Editioni386
XfsdumpXfsdump Version2.2.38
SuseOpensuse Version10.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.112
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.4 3.4 6.4
AV:L/AC:M/Au:N/C:P/I:P/A:P
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.