CVE-2012-5659
Published Mar 12, 2013
Last updated 12 years ago
Overview
- Description
- Untrusted search path vulnerability in plugins/abrt-action-install-debuginfo-to-abrt-cache.c in Automatic Bug Reporting Tool (ABRT) 2.0.9 and earlier allows local users to load and execute arbitrary Python modules by modifying the PYTHONPATH environment variable to reference a malicious Python module.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 3.7
- Impact score
- 6.4
- Exploitability score
- 1.9
- Vector string
- AV:L/AC:H/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Evaluator
- Comment
- Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426: Untrusted Search Path'
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D19F1BD-9843-432A-B303-1DD3F87CB4B6", "versionEndIncluding": "2.0.9" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C89B966A-5D56-4926-A979-54ECF2DBCFB9" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D37CA6FA-978B-43C6-90D0-5D28CD2F7AA5" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E7F9FFA-BF4A-4EAA-9807-2AFF279FAD06" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6A8F7CC-9E5E-4463-9040-252E1A568220" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9E13C48-AA37-46A7-BD67-FBB242563D44" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.4.980:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C0E251E-F968-4191-80D1-2EC2A0FA128A" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.4.981:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BEC26A29-9E64-472F-A3DC-7D62AF55EE3E" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F8AAB96-7D1E-4F69-8F8F-A8B54C69ED12" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AB36A8D-176D-4A24-811D-938CE3B90472" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "840907BF-0AE0-486D-BABD-7E1443CB8E4B" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7EC0DA15-71FB-4C10-A67A-F4A8A838ADAA" } ], "operator": "OR" } ] } ]