Vulnerability Description
IBM Lotus Notes 8 for Linux before 8.0.1 uses (1) unspecified weak permissions for the installation kit obtained through a Notes 8 download and (2) 0777 permissions for the installdata file that is created by setup.sh, which allows local users to gain privileges via a Trojan horse file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ibm | Lotus Notes | <= 8.0.1 |
Related Weaknesses (CWE)
References
- http://osvdb.org/40933
- http://osvdb.org/40934
- http://secunia.com/advisories/27860Vendor Advisory
- http://securitytracker.com/id?1019009
- http://www-1.ibm.com/support/docview.wss?uid=swg21289273
- http://www.vupen.com/english/advisories/2007/4037
- http://osvdb.org/40933
- http://osvdb.org/40934
- http://secunia.com/advisories/27860Vendor Advisory
- http://securitytracker.com/id?1019009
- http://www-1.ibm.com/support/docview.wss?uid=swg21289273
- http://www.vupen.com/english/advisories/2007/4037
FAQ
What is CVE-2007-6594?
CVE-2007-6594 is a vulnerability with a CVSS score of 6.9 (MEDIUM). IBM Lotus Notes 8 for Linux before 8.0.1 uses (1) unspecified weak permissions for the installation kit obtained through a Notes 8 download and (2) 0777 permissions for the installdata file that is cr...
How severe is CVE-2007-6594?
CVE-2007-6594 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-6594?
Check the references section above for vendor advisories and patch information. Affected products include: Ibm Lotus Notes.