Vulnerabilities > CVE-2006-7191 - Unspecified vulnerability in Ldap Account Manager Ldap Account Manager

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Untrusted search path vulnerability in lamdaemon.pl in LDAP Account Manager (LAM) before 1.0.0 allows local users to gain privileges via a modified PATH that points to a malicious rm program.

Vulnerable Configurations

Part Description Count
Application
Ldap_Account_Manager
1

Nessus

NASL familyDebian Local Security Checks
NASL idDEBIAN_DSA-1287.NASL
descriptionTwo vulnerabilities have been identified in the version of ldap-account-manager shipped with Debian 3.1 (sarge). - CVE-2006-7191 An untrusted PATH vulnerability could allow a local attacker to execute arbitrary code with elevated privileges by providing a malicious rm executable and specifying a PATH environment variable referencing this executable. - CVE-2007-1840 Improper escaping of HTML content could allow an attacker to execute a cross-site scripting attack (XSS) and execute arbitrary code in the victim
last seen2020-06-01
modified2020-06-02
plugin id25176
published2007-05-10
reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/25176
titleDebian DSA-1287-1 : ldap-account-manager - multiple vulnerabilities
code
#%NASL_MIN_LEVEL 80502

#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Debian Security Advisory DSA-1287. The text 
# itself is copyright (C) Software in the Public Interest, Inc.
#

include("compat.inc");

if (description)
{
  script_id(25176);
  script_version("1.13");
  script_cvs_date("Date: 2019/08/02 13:32:20");

  script_cve_id("CVE-2006-7191", "CVE-2007-1840");
  script_xref(name:"DSA", value:"1287");

  script_name(english:"Debian DSA-1287-1 : ldap-account-manager - multiple vulnerabilities");
  script_summary(english:"Checks dpkg output for the updated package");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Debian host is missing a security-related update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Two vulnerabilities have been identified in the version of
ldap-account-manager shipped with Debian 3.1 (sarge).

  - CVE-2006-7191
    An untrusted PATH vulnerability could allow a local
    attacker to execute arbitrary code with elevated
    privileges by providing a malicious rm executable and
    specifying a PATH environment variable referencing this
    executable.

  - CVE-2007-1840
    Improper escaping of HTML content could allow an
    attacker to execute a cross-site scripting attack (XSS)
    and execute arbitrary code in the victim's browser in
    the security context of the affected website."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=415379"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://security-tracker.debian.org/tracker/CVE-2006-7191"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://security-tracker.debian.org/tracker/CVE-2007-1840"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.debian.org/security/2007/dsa-1287"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"Upgrade the ldap-account-manager package.

For the old stable distribution (sarge), this problem has been fixed
in version 0.4.9-2sarge1. Newer versions of Debian (etch, lenny, and
sid), are not affected."
  );
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:ldap-account-manager");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.1");

  script_set_attribute(attribute:"patch_publication_date", value:"2007/05/07");
  script_set_attribute(attribute:"plugin_publication_date", value:"2007/05/10");
  script_set_attribute(attribute:"vuln_publication_date", value:"2006/03/01");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.");
  script_family(english:"Debian Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");

  exit(0);
}


include("audit.inc");
include("debian_package.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;
if (deb_check(release:"3.1", prefix:"ldap-account-manager", reference:"0.4.9-2sarge1")) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
  else security_hole(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");