<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf"
><DocumentTitle xml:lang="en"
>CVE-2005-2960</DocumentTitle
><DocumentType
>SUSE CVE</DocumentType
><DocumentPublisher Type="Vendor"
><ContactDetails
>security@suse.de</ContactDetails
><IssuingAuthority
>SUSE Security Team</IssuingAuthority
></DocumentPublisher
><DocumentTracking
><Identification
><ID
>SUSE CVE-2005-2960</ID
></Identification
><Status
>Interim</Status
><Version
>1</Version
><RevisionHistory
><Revision
><Number
>1</Number
><Date
>2024-07-18T02:30:24Z</Date
><Description
>current</Description
></Revision
></RevisionHistory
><InitialReleaseDate
>2024-07-18T02:30:24Z</InitialReleaseDate
><CurrentReleaseDate
>2024-07-18T02:30:24Z</CurrentReleaseDate
><Generator
><Engine
>cve-database/bin/generate-cvrf-cve.pl</Engine
><Date
>2020-12-27T01:00:00Z</Date
></Generator
></DocumentTracking
><DocumentNotes
><Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en"
>CVE-2005-2960</Note
><Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en"
>cfengine 1.6.5 and 2.1.16 allows local users to overwrite arbitrary files via a symlink attack on temporary files used by vicf.in, a different vulnerability than CVE-2005-3137.</Note
><Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en"
>The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note
></DocumentNotes
><DocumentReferences
><Reference Type="Self"
><URL
>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JEB4MGA7ZHLZN7LAGGSGT2FVNZ76HOWH/#JEB4MGA7ZHLZN7LAGGSGT2FVNZ76HOWH</URL
><Description
>E-Mail link for SUSE-SR:2005:023</Description
></Reference
><Reference Type="Self"
><URL
>https://www.suse.com/support/security/rating/</URL
><Description
>SUSE Security Ratings</Description
></Reference
></DocumentReferences
><ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod"
></ProductTree
><Vulnerability Ordinal="1" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln"
><Notes
><Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"
>cfengine 1.6.5 and 2.1.16 allows local users to overwrite arbitrary files via a symlink attack on temporary files used by vicf.in, a different vulnerability than CVE-2005-3137.</Note
></Notes
><CVE
>CVE-2005-2960</CVE
><ProductStatuses
></ProductStatuses
><Threats
><Threat Type="Impact"
><Description
>moderate</Description
></Threat
></Threats
><CVSSScoreSets
><ScoreSetV2
><BaseScoreV2
>2.1</BaseScoreV2
><VectorV2
>AV:L/AC:L/Au:N/C:N/I:P/A:N</VectorV2
></ScoreSetV2
></CVSSScoreSets
></Vulnerability
></cvrfdoc
>
