Vulnerability Description
Michael Still gtalkbot before 1.2 places username and password arguments on the command line, which allows local users to obtain sensitive information by listing the process.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Michael Still | Gtalkbot | <= 1.1 |
References
- http://freshmeat.net/projects/gtalkbot/?branch_id=67830&release_id=245004
- http://osvdb.org/33071
- http://secunia.com/advisories/23942
- http://www.securityfocus.com/bid/22322
- http://www.stillhq.com/gtalkbot/
- http://www.stillhq.com/gtalkbot/000003.html
- http://www.vupen.com/english/advisories/2007/0408
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31923
- http://freshmeat.net/projects/gtalkbot/?branch_id=67830&release_id=245004
- http://osvdb.org/33071
- http://secunia.com/advisories/23942
- http://www.securityfocus.com/bid/22322
- http://www.stillhq.com/gtalkbot/
- http://www.stillhq.com/gtalkbot/000003.html
- http://www.vupen.com/english/advisories/2007/0408
FAQ
What is CVE-2007-0627?
CVE-2007-0627 is a vulnerability with a CVSS score of 4.9 (MEDIUM). Michael Still gtalkbot before 1.2 places username and password arguments on the command line, which allows local users to obtain sensitive information by listing the process.
How severe is CVE-2007-0627?
CVE-2007-0627 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-0627?
Check the references section above for vendor advisories and patch information. Affected products include: Michael Still Gtalkbot.