CVE-2013-0164
Published Feb 24, 2013
Last updated 2 years ago
Overview
- Description
- The lockwrap function in port-proxy/bin/openshift-port-proxy-cfg in Red Hat OpenShift Origin before 1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 3.6
- Impact score
- 4.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openshift:*:-:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D4E1F6B-34CD-4926-88A3-E440846BF387", "versionEndIncluding": "1.0" }, { "criteria": "cpe:2.3:a:redhat:openshift_origin:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D94C104-7375-4D23-97F7-E9B861A70E1C" } ], "operator": "OR" } ] } ]