Vulnerability Description
The tspc.conf configuration file in freenet6 before 0.9.6 and before 1.0 on Debian Linux has world readable permissions, which could allow local users to gain sensitive information, such as a username and password.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freenet6 | Freenet6 | 0.9.6 |
References
- http://secunia.com/advisories/12705/
- http://securitytracker.com/id?1011460
- http://www.debian.org/security/2004/dsa-555PatchVendor Advisory
- http://www.securityfocus.com/bid/11280PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17544
- http://secunia.com/advisories/12705/
- http://securitytracker.com/id?1011460
- http://www.debian.org/security/2004/dsa-555PatchVendor Advisory
- http://www.securityfocus.com/bid/11280PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17544
FAQ
What is CVE-2004-0563?
CVE-2004-0563 is a vulnerability with a CVSS score of 2.1 (LOW). The tspc.conf configuration file in freenet6 before 0.9.6 and before 1.0 on Debian Linux has world readable permissions, which could allow local users to gain sensitive information, such as a username...
How severe is CVE-2004-0563?
CVE-2004-0563 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-0563?
Check the references section above for vendor advisories and patch information. Affected products include: Freenet6 Freenet6.