CVE-2007-3337
CAID-Ingres.txt
Severity Score
7.1
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
wakeup in Ingres database server 2006 9.0.4, r3, 2.6, and 2.5, as used in multiple CA (Computer Associates) products, allows local users to truncate arbitrary files via a symlink attack on the alarmwkp.def file.
El inicio (wakeup) en la base de datos Ingres server 2006 9.0.4, r3, 2.6 y 2.5, tal y como se usa en los productos CA (Computer Associates), permite a usuarios locales truncar ficheros de su elección mediante un ataque symlink (de enlaces simbólicos) en el fichero alarmwkp.def.
Various CA products that embed Ingres products contain multiple vulnerabilities that can allow an attacker to potentially execute arbitrary code.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-06-21 CVE Reserved
- 2007-06-22 CVE Published
- 2010-08-17 First Exploit
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://osvdb.org/37485 | Vdb Entry | |
http://secunia.com/advisories/25756 | Third Party Advisory | |
http://secunia.com/advisories/25775 | Third Party Advisory | |
http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=145778 | X_refsource_confirm | |
http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35451 | X_refsource_confirm | |
http://www.ngssoftware.com/advisories/medium-risk-vulnerability-in-ingres-file-truncation | X_refsource_misc | |
http://www.securityfocus.com/archive/1/472200/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/24585 | Vdb Entry | |
http://www.vupen.com/english/advisories/2007/2288 | Vdb Entry | |
http://www.vupen.com/english/advisories/2007/2290 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/92818 | 2010-08-17 |
URL | Date | SRC |
---|---|---|
http://supportconnectw.ca.com/public/ca_common_docs/ingresvuln_letter.asp | 2018-10-16 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ingres Search vendor "Ingres" | Database Server Search vendor "Ingres" for product "Database Server" | 2.5 Search vendor "Ingres" for product "Database Server" and version "2.5" | - |
Affected
| ||||||
Ingres Search vendor "Ingres" | Database Server Search vendor "Ingres" for product "Database Server" | 2.6 Search vendor "Ingres" for product "Database Server" and version "2.6" | - |
Affected
| ||||||
Ingres Search vendor "Ingres" | Database Server Search vendor "Ingres" for product "Database Server" | 9.0.4 Search vendor "Ingres" for product "Database Server" and version "9.0.4" | - |
Affected
| ||||||
Ingres Search vendor "Ingres" | Database Server Search vendor "Ingres" for product "Database Server" | r3 Search vendor "Ingres" for product "Database Server" and version "r3" | - |
Affected
|