CVE-2018-0449

CVSS V2 Low 3.3 CVSS V3 Medium 4.2
Description
A vulnerability in the Cisco Jabber Client Framework (JCF) software, installed as part of the Cisco Jabber for Mac client, could allow an authenticated, local attacker to corrupt arbitrary files on an affected device that has elevated privileges. The vulnerability exists due to insecure directory permissions set on a JCF created directory. An authenticated attacker with the ability to access an affected directory could create a hard link to an arbitrary location on the affected system. An attacker could convince another user that has administrative privileges to perform an install or update the Cisco Jabber for Mac client to perform such actions, allowing files to be created in an arbitrary location on the disk or an arbitrary file to be corrupted when it is appended to or overwritten.
Overview
  • CVE ID
  • CVE-2018-0449
  • Assigner
  • ykramarz@cisco.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2019-01-10T16:29:00
  • Last Modified Date
  • 2020-08-28T18:15:45
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:cisco:jabber:12.1\(0\):*:*:*:*:mac_os_x:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:L/AC:M/Au:N/C:N/I:P/A:P
  • Access Vector
  • LOCAL
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 3.3
  • Severity
  • LOW
  • Exploitability Score
  • 3.4
  • Impact Score
  • 4.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N
  • Attack Vector
  • LOCAL
  • Attack Compatibility
  • LOW
  • Privileges Required
  • HIGH
  • User Interaction
  • REQUIRED
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 4.2
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 0.6
  • Impact Score
  • 3.6
History
Created Old Value New Value Data Type Notes
2022-05-10 16:27:49 Added to TrackCVE
2022-12-03 16:17:05 psirt@cisco.com ykramarz@cisco.com CVE Assigner updated
2022-12-03 16:17:05 2019-01-10T16:29Z 2019-01-10T16:29:00 CVE Published Date updated
2022-12-03 16:17:05 2020-08-28T18:15:45 CVE Modified Date updated
2022-12-03 16:17:05 Analyzed Vulnerability Status updated