CVE-2011-1920
Published May 23, 2011
Last updated 7 years ago
Overview
- Description
- The make include files in NetBSD before 1.6.2, as used in pmake 1.111 and other products, allow local users to overwrite arbitrary files via a symlink attack on a /tmp/_depend##### temporary file, related to (1) bsd.lib.mk and (2) bsd.prog.mk.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 3.3
- Impact score
- 4.9
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:N/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-59
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:netbsd:netbsd:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B55E4B92-88E0-41F0-AFA7-046A8D34A2CA" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26A936FF-9942-4A95-BE65-57A8C1B6C8AC", "versionEndIncluding": "1.6.1" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DF613C9-DC4A-45F0-BEE1-8450762B0089" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "441CEF2E-9687-4930-8536-B8B83018BD28" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55DD3C82-0B7D-4B25-B603-AD6C6D59239A" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC7A39CD-C4B2-4FD9-A450-E5C7A5480174" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7CBA1B13-B378-4F13-BD13-EC58F15F5C81" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8C8CAB1-2D8C-4875-A795-41178D48410F" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D3C937A-E9D8-474A-ABEB-A927EF7CC5B0" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A8F8DE7-7A84-4350-A6D8-FCCB561D63B2" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C422E343-ADF2-427D-865D-B5C35431EFD1" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C288A88-11C6-429E-A109-0395D0989264" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "516C6D9A-7483-4E36-A2E0-42698161AD31" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1F89124-E194-4C7A-B06D-8535B4066AA3" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E10D9BF9-FCC7-4680-AD3A-95757FC005EA" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78E8C3A4-9FA7-4F2A-8C65-D4404715E674" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AC78BA4-70F4-4B9F-93C2-B107E4DCC418" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28A10F5A-067E-4DD8-B585-ABCD6F6B324E" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ihji:pmake:1.111:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CABB6C56-E62F-4A49-8B75-A7744E6A5363" } ], "operator": "OR" } ], "operator": "AND" } ]