Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2012-2451

Опубликовано: 27 июн. 2012
Источник: nvd
CVSS2: 3.6
EPSS Низкий

Описание

The Config::IniFiles module before 2.71 for Perl creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack. NOTE: some of these details are obtained from third party information. NOTE: it has been reported that this might only be exploitable by writing in the same directory as the .ini file. If this is the case, then this issue might not cross privilege boundaries.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:shlomi_fish:config-inifiles:*:*:*:*:*:*:*:*
Версия до 2.70 (включая)

EPSS

Процентиль: 26%
0.00091
Низкий

3.6 Low

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

ubuntu
больше 13 лет назад

The Config::IniFiles module before 2.71 for Perl creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack. NOTE: some of these details are obtained from third party information. NOTE: it has been reported that this might only be exploitable by writing in the same directory as the .ini file. If this is the case, then this issue might not cross privilege boundaries.

redhat
почти 14 лет назад

The Config::IniFiles module before 2.71 for Perl creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack. NOTE: some of these details are obtained from third party information. NOTE: it has been reported that this might only be exploitable by writing in the same directory as the .ini file. If this is the case, then this issue might not cross privilege boundaries.

debian
больше 13 лет назад

The Config::IniFiles module before 2.71 for Perl creates temporary fil ...

github
больше 3 лет назад

The Config::IniFiles module before 2.71 for Perl creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack. NOTE: some of these details are obtained from third party information. NOTE: it has been reported that this might only be exploitable by writing in the same directory as the .ini file. If this is the case, then this issue might not cross privilege boundaries.

EPSS

Процентиль: 26%
0.00091
Низкий

3.6 Low

CVSS2

Дефекты

NVD-CWE-Other