{"vuid":"VU#443370","idnumber":"443370","name":"Groove Virtual Office sets insecure permissions on installation components","keywords":["Groove Virtual Office","EVERYONE","NTFS permissions","Groove Folders"],"overview":"Groove Virtual Office installation sets insecure permissions on installation files and folders by default. As a result, an attacker could gain access to sensitive data.","clean_desc":"Groove Virtual Office provides a collaborative working environment that includes shared documents, databases, applications, and various other tools to facilitate communication and productivity. Groove Virtual Office is designed for the Microsoft Windows platform, thus the directories Groove installs are governed by the Windows NTFS directory permissions structure. There is a vulnerability in the permissions assigned to the Groove Virtual Office client installation directories. Specifically, the installation directories are accessible by members of the EVERYONE group by default. Note that authentication information and user data are stored in these directories.","impact":"An attacker may be able to modify or view sensitive system information.","resolution":"Update\nThis vulnerability is addressed in Groove Virtual Office 3.1 build 2338, 3.1a build 2364, and Groove Workspace Version 2.5n build 1871. These updates are available from http://www.groove.net/update and http://www.groove.net/archive.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by US-CERT.","author":"This document was written by Jeff Gennari.","public":["http://www.groove.net","http://www.groove.net/index.cfm?pagename=Support_Overview","http://www.groove.net/update","http://www.groove.net/archive"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-04-07T18:31:05Z","publicdate":"2005-05-19T00:00:00Z","datefirstpublished":"2005-05-19T15:27:22Z","dateupdated":"2005-05-19T15:43:56Z","revision":73,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"5","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"15","cam_impact":"5","cam_easeofexploitation":"17","cam_attackeraccessrequired":"16","cam_scorecurrent":"3.06","cam_scorecurrentwidelyknown":"8.7975","cam_scorecurrentwidelyknownexploited":"16.4475","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":3.06,"vulnote":null}