{"vuid":"VU#302544","idnumber":"302544","name":"Alertus Desktop Notification for OS X sets insecure permissions for configuration and other files","keywords":["alertus","desktop notification","permissions"],"overview":"Alertus Desktop Notification for OS X, version 2.9.30.1700 and earlier, sets insecure permissions for configuration and other files, which may enable an unprivileged attacker to disable notifications and modify content locally.","clean_desc":"CWE-276: Incorrect Default Permissions - CVE-2016-5087 Alertus Desktop Notification is mass emergency notification software designed to receive and display alerts on PC and Mac client systems. Alertus Desktop Notification for OS X, version 2.9.30.1700 and earlier, sets insecure permissions for configuration and other files by default, which may enable an unprivileged, local attacker to disable notifications and modify content.","impact":"A local, unprivileged attacker may modify or remove configuration or other files to disable notifications or alter content.","resolution":"Apply an update The vendor has released version 2.9.31.1710 to address this issue. Users are encouraged to update to the latest version. For users who may be unable or unwilling to upgrade, the vendor has provided the following guidance: We are providing a script that fixes the permissions if an upgrade cannot be performed. Refer to the URL below for script and more information: https://helpdesk.alertus.com/solution/articles/3000054559-osx-permissions-patch-script-for-alertus-desktop-osx-2-9-30-1700","workarounds":"","sysaffected":"","thanks":"Thanks to Gerrit DeWitt of Georgia State University for reporting this vulnerability.","author":"This document was written by Joel Land.","public":["http://alertus.com/capabilities/desktop","https://helpdesk.alertus.com/solution/articles/3000054559-osx-permissions-patch-script-for-alertus-desktop-osx-2-9-30-1700"],"cveids":["CVE-2016-5087"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2016-04-07T13:27:19Z","publicdate":"2016-06-23T00:00:00Z","datefirstpublished":"2016-06-23T14:00:44Z","dateupdated":"2016-06-23T14:00:44Z","revision":14,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"1","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"L","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"L","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"H","cvss_basescore":"3.2","cvss_basevector":"AV:L/AC:L/Au:S/C:N/I:P/A:P","cvss_temporalscore":"2.6","cvss_environmentalscore":"2.95078188227465","cvss_environmentalvector":"CDP:L/TD:M/CR:ND/IR:ND/AR:H","metric":0.0,"vulnote":null}