UBUNTU-CVE-2016-2057

Source
https://ubuntu.com/security/CVE-2016-2057
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-2057.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2016-2057
Related
Published
2016-04-13T16:59:00Z
Modified
2025-01-13T10:21:12Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

lib/xymond_ipc.c in Xymon 4.1.x, 4.2.x, and 4.3.x before 4.3.25 use weak permissions (666) for an unspecified IPC message queue, which allows local users to inject arbitrary messages by writing to that queue.

References

Affected packages

Ubuntu:16.04:LTS / xymon

Package

Name
xymon
Purl
pkg:deb/ubuntu/xymon@4.3.25-1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.3.25-1

Affected versions

4.*

4.3.21-1
4.3.21-2
4.3.22~beta-1
4.3.24-1
4.3.24-2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "4.3.25-1",
            "binary_name": "xymon"
        },
        {
            "binary_version": "4.3.25-1",
            "binary_name": "xymon-client"
        },
        {
            "binary_version": "4.3.25-1",
            "binary_name": "xymon-client-dbgsym"
        },
        {
            "binary_version": "4.3.25-1",
            "binary_name": "xymon-dbgsym"
        }
    ]
}