Format string vulnerability in Tripwire commercial 4.0.1 and earlier, including 2.4, and open source 2.3.1 and earlier, allows local users to gain privileges via format string specifiers in a file name, which is used in the generation of an email report.
2004-08-06T04:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 7.2 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | tripwire | tripwire | 2.2.1 | Yes |
Application | tripwire | tripwire | 2.3.0 | Yes |
Application | tripwire | tripwire | 2.3.1 | Yes |
Application | tripwire | tripwire | 2.3.1.2 | Yes |
Application | tripwire | tripwire | 2.4.0 | Yes |
Application | tripwire | tripwire | 2.4.2 | Yes |
Application | tripwire | tripwire | 3.0 | Yes |
Application | tripwire | tripwire | 3.0.1 | Yes |
Application | tripwire | tripwire | 4.0 | Yes |
Application | tripwire | tripwire | 4.0.1 | Yes |
Application | tripwire | tripwire | 4.1 | Yes |