First published: Wed Apr 18 2007(Updated: )
SSH Tectia Server for IBM z/OS before 5.4.0 uses insecure world-writable permissions for (1) the server pid file, which allows local users to cause arbitrary processes to be stopped, or (2) when _BPX_BATCH_UMASK is missing from the environment, creates HFS files with insecure permissions, which allows local users to read or modify these files and have other unknown impact.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SSH Tectia Server | <=5.3.0 | |
SSH Tectia Server | =5.0 | |
SSH Tectia Server | =5.1.0 | |
SSH Tectia Server | =5.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2063 has a medium severity risk level due to its potential for allowing local users to manipulate server processes.
To fix CVE-2007-2063, upgrade to SSH Tectia Server for IBM z/OS version 5.4.0 or later to ensure secure permissions.
CVE-2007-2063 affects SSH Tectia Server for IBM z/OS versions up to 5.3.0, including versions 5.0, 5.1.0, and 5.2.0.
CVE-2007-2063 exposes insecure world-writable permissions for the server pid file and creates HFS files with insecure permissions.
CVE-2007-2063 can allow local users to stop arbitrary processes, which may lead to unauthorized access or disruption of services.