CVE-2005-1394
Solaris 10.x - ESRI Arcgis Format String Privilege Escalation
Severity Score
7.2
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Format string vulnerability in ArcGIS for ESRI ArcInfo Workstation 9.0 allows local users to gain privileges via format string specifiers in the ARCHOME environment variable to (1) wservice or (2) lockmgr.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2005-04-30 First Exploit
- 2005-05-02 CVE Reserved
- 2005-05-02 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://marc.info/?l=full-disclosure&m=111489411524630&w=2 | Mailing List | |
http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=14&MetaID=1015 | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/972 | 2005-04-30 |
URL | Date | SRC |
---|---|---|
http://securitytracker.com/id?1013852 | 2016-10-18 | |
http://www.digitalmunition.com/DMA%5B2005-0425a%5D.txt | 2016-10-18 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/15196 | 2016-10-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Esri Search vendor "Esri" | Arcgis Search vendor "Esri" for product "Arcgis" | 9.0 Search vendor "Esri" for product "Arcgis" and version "9.0" | - |
Affected
| ||||||
Esri Search vendor "Esri" | Arcinfo Workstation Search vendor "Esri" for product "Arcinfo Workstation" | 9.0 Search vendor "Esri" for product "Arcinfo Workstation" and version "9.0" | - |
Affected
|