Vulnerability Description
reportbug before 2.62 creates the .reportbugrc configuration file with world-readable permissions, which allows local users to obtain email smarthost passwords.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Reportbug | 2.60 |
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=295407Vendor Advisory
- http://marc.info/?l=bugtraq&m=110972153627388&w=2
- http://secunia.com/advisories/14422/PatchVendor Advisory
- https://bugzilla.ubuntu.com/show_bug.cgi?id=6600Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19504
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=295407Vendor Advisory
- http://marc.info/?l=bugtraq&m=110972153627388&w=2
- http://secunia.com/advisories/14422/PatchVendor Advisory
- https://bugzilla.ubuntu.com/show_bug.cgi?id=6600Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19504
FAQ
What is CVE-2005-0624?
CVE-2005-0624 is a vulnerability with a CVSS score of 2.1 (LOW). reportbug before 2.62 creates the .reportbugrc configuration file with world-readable permissions, which allows local users to obtain email smarthost passwords.
How severe is CVE-2005-0624?
CVE-2005-0624 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-0624?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Reportbug.