Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2009-3289

Опубликовано: 22 сент. 2009
Источник: nvd
CVSS3: 7.8
CVSS2: 4.4
EPSS Низкий

Описание

The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:gnome:glib:2.0:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:11:-:*:*:*:*:*:*

EPSS

Процентиль: 23%
0.00074
Низкий

7.8 High

CVSS3

4.4 Medium

CVSS2

Дефекты

CWE-732

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 16 лет назад

The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.

redhat
больше 16 лет назад

The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.

CVSS3: 7.8
debian
около 16 лет назад

The g_file_copy function in glib 2.0 sets the permissions of a target ...

CVSS3: 7.8
github
больше 3 лет назад

The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.

EPSS

Процентиль: 23%
0.00074
Низкий

7.8 High

CVSS3

4.4 Medium

CVSS2

Дефекты

CWE-732