Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-3289

Опубликовано: 28 авг. 2009
Источник: redhat
CVSS2: 3.3

Описание

The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.

Отчет

Not vulnerable. This issue does not affect the versions of glib2 as shipped with Red Hat Enterprise Linux 3, 4, or 5.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=524829glib2: folder | symlink permissions change after copy via nautilus

3.3 Low

CVSS2

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 16 лет назад

The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.

CVSS3: 7.8
nvd
около 16 лет назад

The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.

CVSS3: 7.8
debian
около 16 лет назад

The g_file_copy function in glib 2.0 sets the permissions of a target ...

CVSS3: 7.8
github
больше 3 лет назад

The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.

3.3 Low

CVSS2