{"vuid":"VU#637068","idnumber":"637068","name":"LabTech contains privilege escalation vulnerability","keywords":["LabTech","CWE-284"],"overview":"LabTech startup scripts and directories on Linux platforms are world-writeable and the scripts execute with root privileges.","clean_desc":"CWE-284: Improper Access Control\nLabTech startup scripts and directories on Linux platforms are world-writeable and the scripts execute with root privileges.","impact":"A local, authenticated attacker may be able to gain root access to the system.","resolution":"Apply an Update This issue has been fixed in Labtech versions 100.237 and above, which is currently in beta at the time of this writing. Customers who wish to acquire this version must sign up for Labtech's Beta program. Customers who are not able to upgrade or acquire version 100.237 of the software should consider the following workaround:","workarounds":"Remove world-writable access Users who are unable to upgrade can manually remove world-writable permissions to the Labtech directories and startups scripts in order to mitigate this vulnerability.","sysaffected":"","thanks":"Thanks to  Iwan Boskamp for reporting this vulnerability.","author":"This document was written by Todd Lewellen.","public":["h","t","t","p",":","/","/","w","w","w",".","l","a","b","t","e","c","h","s","o","f","t","w","a","r","e",".","c","o","m","/"],"cveids":["CVE-2015-0926"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-11-14T15:01:14Z","publicdate":"2015-01-23T00:00:00Z","datefirstpublished":"2015-01-23T14:27:04Z","dateupdated":"2015-01-29T14:31:18Z","revision":24,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"L","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"UR","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"6.8","cvss_basevector":"AV:L/AC:L/Au:S/C:C/I:C/A:C","cvss_temporalscore":"5.8","cvss_environmentalscore":"5.78796115968","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}