Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-2737

Опубликовано: 22 июл. 2012
Источник: debian
EPSS Низкий

Описание

The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
accountsservicefixed0.6.21-6package

Примечания

  • https://www.openwall.com/lists/oss-security/2012/06/28/9

  • http://cgit.freedesktop.org/accountsservice/commit/?id=69b526a6cd4c078732068de2ba393cf9242a404b

  • https://bugzilla.redhat.com/show_bug.cgi?id=832532

EPSS

Процентиль: 22%
0.00071
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.

nvd
больше 13 лет назад

The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.

github
больше 3 лет назад

The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.

EPSS

Процентиль: 22%
0.00071
Низкий