Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-3289

Опубликовано: 28 авг. 2009
Источник: redhat
CVSS2: 3.3
EPSS Низкий

Описание

The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.

Отчет

Not vulnerable. This issue does not affect the versions of glib2 as shipped with Red Hat Enterprise Linux 3, 4, or 5.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=524829glib2: folder | symlink permissions change after copy via nautilus

EPSS

Процентиль: 22%
0.00074
Низкий

3.3 Low

CVSS2

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 16 лет назад

The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.

CVSS3: 7.8
nvd
больше 16 лет назад

The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.

CVSS3: 7.8
debian
больше 16 лет назад

The g_file_copy function in glib 2.0 sets the permissions of a target ...

CVSS3: 7.8
github
почти 4 года назад

The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.

EPSS

Процентиль: 22%
0.00074
Низкий

3.3 Low

CVSS2