CVE-2012-5660
Published Mar 12, 2013
Last updated 2 years ago
Overview
- Description
- abrt-action-install-debuginfo in Automatic Bug Reporting Tool (ABRT) 2.0.9 and earlier allows local users to set world-writable permissions for arbitrary files and possibly gain privileges via a symlink attack on "the directories used to store information about crashes."
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.9
- Impact score
- 10
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D19F1BD-9843-432A-B303-1DD3F87CB4B6", "versionEndIncluding": "2.0.9" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C89B966A-5D56-4926-A979-54ECF2DBCFB9" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D37CA6FA-978B-43C6-90D0-5D28CD2F7AA5" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E7F9FFA-BF4A-4EAA-9807-2AFF279FAD06" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6A8F7CC-9E5E-4463-9040-252E1A568220" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9E13C48-AA37-46A7-BD67-FBB242563D44" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.4.980:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C0E251E-F968-4191-80D1-2EC2A0FA128A" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.4.981:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BEC26A29-9E64-472F-A3DC-7D62AF55EE3E" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F8AAB96-7D1E-4F69-8F8F-A8B54C69ED12" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AB36A8D-176D-4A24-811D-938CE3B90472" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "840907BF-0AE0-486D-BABD-7E1443CB8E4B" }, { "criteria": "cpe:2.3:a:redhat:automatic_bug_reporting_tool:2.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7EC0DA15-71FB-4C10-A67A-F4A8A838ADAA" } ], "operator": "OR" } ] } ]