Format string vulnerability in Tripwire commercial 4.0.1 and earlier, including 2.4, and open source 2.3.1 and earlier, allows local users to gain privileges via format string specifiers in a file name, which is used in the generation of an email report.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tripwire | Tripwire | 2.2.1 (including) | 2.2.1 (including) |
Tripwire | Tripwire | 2.3.0 (including) | 2.3.0 (including) |
Tripwire | Tripwire | 2.3.1 (including) | 2.3.1 (including) |
Tripwire | Tripwire | 2.3.1.2 (including) | 2.3.1.2 (including) |
Tripwire | Tripwire | 2.4.0 (including) | 2.4.0 (including) |
Tripwire | Tripwire | 2.4.2 (including) | 2.4.2 (including) |
Tripwire | Tripwire | 3.0 (including) | 3.0 (including) |
Tripwire | Tripwire | 3.0.1 (including) | 3.0.1 (including) |
Tripwire | Tripwire | 4.0 (including) | 4.0 (including) |
Tripwire | Tripwire | 4.0.1 (including) | 4.0.1 (including) |
Tripwire | Tripwire | 4.1 (including) | 4.1 (including) |
Tripwire | Ubuntu | dapper | * |
Tripwire | Ubuntu | devel | * |
Tripwire | Ubuntu | edgy | * |
Tripwire | Ubuntu | feisty | * |
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 | RedHat | * | |
Red Hat Enterprise Linux ES version 2.1 | RedHat | * | |
Red Hat Enterprise Linux WS version 2.1 | RedHat | * |