{"id":"CVE-2007-1507","details":"The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.","modified":"2026-01-27T04:08:52.569250Z","published":"2007-03-20T10:19:00Z","withdrawn":"2026-01-27T04:08:52.569250Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/24582"},{"type":"ADVISORY","url":"http://secunia.com/advisories/24599"},{"type":"ADVISORY","url":"http://secunia.com/advisories/24607"},{"type":"ADVISORY","url":"http://secunia.com/advisories/24720"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-200704-03.xml"},{"type":"ADVISORY","url":"http://www.debian.org/security/2007/dsa-1271"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:066"},{"type":"ADVISORY","url":"http://www.openafs.org/pipermail/openafs-announce/2007/000185.html"},{"type":"FIX","url":"http://www.openafs.org/pipermail/openafs-announce/2007/000186.html"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2007/1033"},{"type":"WEB","url":"http://www.openafs.org/pipermail/openafs-announce/2007/000187.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/23060"},{"type":"WEB","url":"http://www.securitytracker.com/id?1017807"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33180"}],"schema_version":"1.7.3"}