4 results (0.006 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 3

iCal 2.1 Patch 2 installs many files with world-writeable permissions, which allows local users to modify the iCal configuration and execute arbitrary commands by replacing the iplncal.sh program with a Trojan horse. • https://www.exploit-db.com/exploits/20275 http://www.atstake.com/research/advisories/2000/a100900-1.txt http://www.osvdb.org/7212 http://www.securityfocus.com/bid/1768 https://exchange.xforce.ibmcloud.com/vulnerabilities/5756 •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 3

csstart program in iCal 2.1 Patch 2 uses relative pathnames to install the libsocket and libnsl libraries, which could allow the icsuser account to gain root privileges by creating a Trojan Horse library in the current or parent directory. • https://www.exploit-db.com/exploits/20276 http://www.atstake.com/research/advisories/2000/a100900-1.txt http://www.osvdb.org/7209 http://www.securityfocus.com/bid/1769 https://exchange.xforce.ibmcloud.com/vulnerabilities/5757 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

csstart program in iCal 2.1 Patch 2 searches for the cshttpd program in the current working directory, which allows local users to gain root privileges by creating a Trojan Horse cshttpd program in a directory and calling csstart from that directory. • http://www.atstake.com/research/advisories/2000/a100900-1.txt http://www.osvdb.org/7210 http://www.securityfocus.com/bid/1769 https://exchange.xforce.ibmcloud.com/vulnerabilities/5757 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

The GUI installation for iCal 2.1 Patch 2 disables access control for the X server using an "xhost +" command, which allows remote attackers to monitor X Windows events and gain privileges. • http://www.atstake.com/research/advisories/2000/a100900-1.txt http://www.osvdb.org/7213 http://www.securityfocus.com/bid/1767 https://exchange.xforce.ibmcloud.com/vulnerabilities/5752 •