{"vuid":"VU#764025","idnumber":"764025","name":"Secure Elements Class 5 AVR server fails to properly validate pathnames when downloading updates","keywords":["Secure Elements","unauthorized data modification","class 5 EVM","c5 evm"],"overview":"The Secure Elements Class 5 AVR server fails to properly validate pathnames when downloading updates. This may allow an attacker to overwrite arbitrary files on the server system.","clean_desc":"Class 5 AVR Secure Elements Class 5 AVR (Automated Vulnerability Remediation) is a security product that monitors and enforces security policies on network assets. Class 5 AVR is now known as C5 EVM (Enterprise Vulnerability Management). The Class 5 AVR software includes both server and client components. Class 5 AVR client The Class 5 AVR client listens on 60000/udp and an additional tcp port. This client receives commands sent by the Class 5 AVR server. Class 5 AVR server The Class 5 AVR server is available as an appliance or as software that runs on commodity hardware. The Class 5 AVR server contains information about network assets, vulnerabilities, and remediation history. The problem The Class 5 AVR server fails to properly validate pathnames when downloading updates.","impact":"When combined with VU#764025, an attacker may be able to overwrite arbitrary files on the AVR server as root.","resolution":"Upgrade or patch\nThis issue has been resolved in C5 EVM 2.8.1.","workarounds":"","sysaffected":"","thanks":"Thanks to the NOAA N-CIRT Lab for reporting this vulnerability.","author":"This document was written by Will Dormann.","public":["h","t","t","p",":","/","/","w","w","w",".","s","e","c","u","r","e","-","e","l","e","m","e","n","t","s",".","c","o","m","/","p","r","o","d","u","c","t","s","/","i","n","d","e","x",".","h","t","m"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-11-02T20:18:56Z","publicdate":"2006-05-30T00:00:00Z","datefirstpublished":"2006-05-30T20:41:01Z","dateupdated":"2006-06-07T03:01:57Z","revision":6,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"1","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"2","cam_impact":"16","cam_easeofexploitation":"3","cam_attackeraccessrequired":"12","cam_scorecurrent":"0.2376","cam_scorecurrentwidelyknown":"0.648","cam_scorecurrentwidelyknownexploited":"1.08","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.2376,"vulnote":null}