First published: Wed Feb 21 2007(Updated: )
The Net Direct client for Linux before 6.0.5 in Nortel Application Switch 2424, VPN 3050 and 3070, and SSL VPN Module 1000 extracts and executes files with insecure permissions, which allows local users to exploit a race condition to replace a world-writable file in /tmp/NetClient and cause another user to execute arbitrary code when attempting to execute this client, as demonstrated by replacing /tmp/NetClient/client.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nortel Alteon 2424 Application Switch | =23.2 | |
Nortel SSL VPN Module 1000 | ||
Nortel VPN Gateway 3070 | ||
Nortel Net Direct Client | <=6.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1057 is considered a high severity vulnerability due to its potential for local users to exploit it for privilege escalation.
To fix CVE-2007-1057, upgrade the Net Direct Client for Linux to version 6.0.5 or later.
CVE-2007-1057 affects the Nortel Net Direct Client for Linux versions prior to 6.0.5, specifically compatible with certain Nortel devices.
CVE-2007-1057 is a local privilege escalation vulnerability caused by insecure file permissions.
No, CVE-2007-1057 requires local access to exploit, as it involves a race condition in the system's execution of files.