fkie_cve-2006-4315
Vulnerability from fkie_nvd
Published
2006-08-23 22:04
Modified
2024-11-21 00:15
Severity ?
Summary
Unquoted Windows search path vulnerability in multiple SSH Tectia products, including Client/Server/Connector 5.0.0 and 5.0.1 and Client/Server before 4.4.5, and Manager 2.12 and earlier, when running on Windows, might allow local users to gain privileges via a malicious program file under "Program Files" or its subdirectories.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6693DC2D-CDA1-4E37-9569-58874F55A48A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CDE975-9E08-493B-9385-3EC2CABC4A15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A63EA6B-2400-48C4-924D-3509971CCBEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0658F08E-2596-4D8E-91AA-44A9DBE8F151",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "74169893-A34F-49FB-8C83-36C4AA808925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "013E94CC-AF68-44D0-826F-28B1825A8DA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9981E30-0D54-4464-8287-E450E7E8F770",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ED17577-F56D-48DF-8863-B4FF039C47D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B74A91E2-C93E-49F4-B349-8E4CEC285C03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.1j:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF7244A-BFF7-4C7C-82FF-6B53236DB86D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BADA4CC-FC94-427A-AF93-9AAFDAADDB91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F1D6B7F-8B52-42C0-8613-740CACFB3463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5024EC6-2A47-4ACE-A661-B78D314C7D0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA64A6E8-0EB7-4BCA-A7AA-245A466C2F22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5058DC44-835D-4BD9-B550-E5CB22F6475F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "23ED4911-6CF5-4562-B421-A328D7BE0291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.3.8k:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F3388A-39FA-4A3A-819A-764A16AAEB54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "81DDF3D8-35EA-4677-B1AC-1CA674EEBCD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F37366E9-F1B6-4458-AE1C-790405AC8740",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C727829-5E3A-41F6-BAB3-01AED39674D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CF57477-FB53-49CC-BAD4-CDC0FD9363F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65FB72FC-37EE-4D42-893E-9C0924EEA2E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:4.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B18D681B-ACE1-47E3-851D-57DA47D1E2F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F470797-BBE4-4360-A38A-2722B8CF3BB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_client:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB6587AA-E91D-4194-81D0-FCF1AA382CAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_connector:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D921A61E-D401-404E-B539-DAFE05D001F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_connector:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "30A3B9E9-3643-443B-A19A-2AE989832C50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_manager:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "207A0CC3-240E-467E-A82D-DB9751378C2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_manager:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "23D62693-EA3F-406E-AC66-79B1CD566F1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_manager:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF059D3-7250-44F9-9337-AD66A0F28071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E4480D2-1B5C-443D-8D7F-976885C33BDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "795DEA94-79D6-4132-B205-AB098E92216A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD05A3E8-105D-4712-8BBE-2D5CF4F78890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D6691FF-77F2-4AE3-B49F-BFB8744AD046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "075B6E8D-4C4B-4E98-94C6-52B842BE65FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "27B99F6E-712C-4205-9185-26F543EFC881",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF0262B-1451-40CA-9DD1-F2DEA793BD61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C27E0224-9431-49EF-8B32-850CDF6FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "88A88A21-7427-4452-8C2A-6C31542FA83C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3DCEAA0-509A-4978-BE53-0CBE084366FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3203DC73-05F2-4A28-9E62-3D87B482586A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BDA1AAC-3FCF-47D8-A6B4-9DB0D776CE14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:4.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F4CDF1-695A-4677-A829-74BB365BF4FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBEF55DD-FC87-42A3-9DAF-9862AA9649CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:4.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC0FA974-7671-4FB7-BB36-274B5970EBAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:4.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6C2BA84-A520-489E-AF08-F3D35B0D580B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:4.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "011F841A-4F1B-49B2-B379-9FE126141568",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:4.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3C54819-CF51-4BBE-873F-4A0E2072D10F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "802C46F0-0FE2-42BD-910A-08CC9639BC4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssh:tectia_server:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B2E96C8-F8F8-4002-B242-3ADDF1E84B7D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unquoted Windows search path vulnerability in multiple SSH Tectia products, including Client/Server/Connector 5.0.0 and 5.0.1 and Client/Server before 4.4.5, and Manager 2.12 and earlier, when running on Windows, might allow local users to gain privileges via a malicious program file under \"Program Files\" or its subdirectories."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ruta no confiable en la b\u00fasqueda no literal de Windows en m\u00faltiples productos SSH de Tectia, incluyendo el Client/Server/Connector 5.0.0 y 5.0.1 y Client/Server anterior a 4.4.5, y Manager 2.12 y anteriores, cuando se ejecutan en Windows, podr\u00edan permitir a usuarios locales escalar privilegios mediante un archivo de programa malicioso en \"Archivos de Programa\" o sus subdirectorios."
    }
  ],
  "id": "CVE-2006-4315",
  "lastModified": "2024-11-21T00:15:39.340",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-08-23T22:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016743"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/19679"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.ssh.com/company/news/2006/english/security/article/775/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28566"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016743"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/19679"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.ssh.com/company/news/2006/english/security/article/775/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28566"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.