Show plain JSON{"id": "CVE-2006-5215", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.6, "accessVector": "LOCAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "HIGH", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 4.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 1.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2006-10-10T04:06:00.000", "references": [{"url": "http://secunia.com/advisories/22992", "source": "cve@mitre.org"}, {"url": "http://securitytracker.com/id?1017015", "source": "cve@mitre.org"}, {"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102652-1", "source": "cve@mitre.org"}, {"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm", "source": "cve@mitre.org"}, {"url": "http://www.netbsd.org/cgi-bin/query-pr-single.pl?number=32805", "source": "cve@mitre.org"}, {"url": "https://bugs.freedesktop.org/show_bug.cgi?id=5898", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29427", "source": "cve@mitre.org"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2205", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/22992", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securitytracker.com/id?1017015", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102652-1", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.netbsd.org/cgi-bin/query-pr-single.pl?number=32805", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bugs.freedesktop.org/show_bug.cgi?id=5898", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29427", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2205", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "The Xsession script, as used by X Display Manager (xdm) in NetBSD before 20060212, X.Org before 20060317, and Solaris 8 through 10 before 20061006, allows local users to overwrite arbitrary files, or read another user's Xsession errors file, via a symlink attack on a /tmp/xses-$USER file."}, {"lang": "es", "value": "La secuencia de comandos Xsession, tambien usado por X Display Manager (xdm) en NetBSD anterior a 12/02/2006, X.Org anterior a 17/03/2006, y Solaris 8 hasta la 10 anterior a 06/10/2006, permiten a un usuario local sobre escribir archivos de su elecci\u00f3n, o leer otros ficheros de errores de usuarios de Xsession, a trav\u00e9s de un ataque de enlaces simb\u00f3licos sobre un archivo/tmp/xses-$USER."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:x.org:xdm:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B856A744-AB2E-471B-B184-7B7D401146CA", "versionEndIncluding": "1.0.3"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netbsd:netbsd:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D660F26B-C329-4F2D-8017-B9442FE8248D", "versionEndIncluding": "current"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DF613C9-DC4A-45F0-BEE1-8450762B0089"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "441CEF2E-9687-4930-8536-B8B83018BD28"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55DD3C82-0B7D-4B25-B603-AD6C6D59239A"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC7A39CD-C4B2-4FD9-A450-E5C7A5480174"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7CBA1B13-B378-4F13-BD13-EC58F15F5C81"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8C8CAB1-2D8C-4875-A795-41178D48410F"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D3C937A-E9D8-474A-ABEB-A927EF7CC5B0"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A8F8DE7-7A84-4350-A6D8-FCCB561D63B2"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C422E343-ADF2-427D-865D-B5C35431EFD1"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87FD0350-38E2-46D3-B17F-6C3F9C3488A7"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:arm32:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DC541BB-95DF-4A31-998F-983255F8B485"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AB998EB-E5F3-414D-AA99-34DC7B32E870"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4319B741-4376-4EA2-9FEB-236C148D1514"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C288A88-11C6-429E-A109-0395D0989264"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "247ABD95-74CA-45B8-8729-3C35C9E11186"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:arm32:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D4C44E8-075A-4B48-88DA-2CAC25CDF159"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:sh3:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "393738E7-93E1-4A37-817B-C023A9BD1DBE"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19D1E7AC-79B6-4136-ADB2-06BEE9773795"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2EE8A19-8AB1-4283-95EA-9EE3C7E5DED7"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "516C6D9A-7483-4E36-A2E0-42698161AD31"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FA1C84C-6624-4032-8D0E-5EBB054F5224"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:arm32:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06B9ADAD-ADDC-47AC-9924-B31B17DDF163"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DC0D30E-DBF1-4FDB-80C0-80DB50D9E77A"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "537FD523-1D44-4D85-AED1-C092E0155CF2"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1F89124-E194-4C7A-B06D-8535B4066AA3"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E10D9BF9-FCC7-4680-AD3A-95757FC005EA"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:sh3:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52F2B17F-A169-402C-AA05-0DE5D805BAD6"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD44E15F-D216-404F-8585-D278175C2A0F"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78E8C3A4-9FA7-4F2A-8C65-D4404715E674"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AC78BA4-70F4-4B9F-93C2-B107E4DCC418"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28A10F5A-067E-4DD8-B585-ABCD6F6B324E"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.6:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DDC444D-E763-4685-97F8-A027DF6F804D"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "249FA642-3732-4654-88CB-3F1D19A5860A"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5071CA39-65B3-4AFB-8898-21819E57A084"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3C3F588-98DA-4F6F-A083-2B9EE534C561"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C2ED81B-8DA2-46D0-AE24-C61BF8E78AE9"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D18C95A3-15E3-41B8-AC28-ACEA57021E24"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CFC6B75-9057-4E58-A4D4-8AEC12AE62E4"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28BD9F91-2384-4557-9648-25FC00D04677"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9CABFAA-594C-45D7-A0C7-795872A0C68A"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:3.99.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7C5D200-B40F-458D-8216-A3C22B21B46A"}, {"criteria": "cpe:2.3:o:netbsd:netbsd:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9875E709-11BA-4B8F-A2FC-26844DD4D563"}, {"criteria": "cpe:2.3:o:sun:solaris:8.0:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32CF7469-6D2F-4E34-8013-7F0D3433D0B2"}, {"criteria": "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1894C542-AA81-40A9-BF47-AE24C93C1ACB"}, {"criteria": "cpe:2.3:o:sun:solaris:8.0:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11847B60-D66B-4386-940A-C53B11853E50"}, {"criteria": "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A711CDC2-412C-499D-9FA6-7F25B06267C6"}, {"criteria": "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B837BB7-5F62-4CD5-9C64-8553C28EA8A7"}, {"criteria": "cpe:2.3:o:sun:solaris:9.0:x86_update_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F305CBD-4329-44DE-A85C-DE9FF371425E"}, {"criteria": "cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7BF232A9-9E0A-481E-918D-65FC82EF36D8"}, {"criteria": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2475113-CFE4-41C8-A86F-F2DA6548D224"}, {"criteria": "cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1E585DC-FC74-4BB0-96B7-C00B6DB610DF"}], "operator": "OR"}]}], "vendorComments": [{"comment": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "lastModified": "2007-03-14T00:00:00", "organization": "Red Hat"}], "sourceIdentifier": "cve@mitre.org", "evaluatorSolution": "This vulnerability is addressed in the following product updates:\r\nX.org, xdm, 2006-03-17\r\nNetBSD, NetBSD, Current 2006-02-12\r\nSun, Solaris, 10 2006-10-06"}