Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-4135

Опубликовано: 07 дек. 2009
Источник: redhat
CVSS2: 1.2
EPSS Низкий

Описание

The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.

Отчет

This issue does not affect users using coreutils binary RPMs, or rebuilding source RPMs. Therefore, we do not plan to release updates addressing this flaw on Red Hat Enterprise Linux 3, 4 and 5. For additional details, refer to the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-4135

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=545439coreutils: Unsafe temporary directory use in "distcheck" rule

EPSS

Процентиль: 9%
0.00032
Низкий

1.2 Low

CVSS2

Связанные уязвимости

ubuntu
около 16 лет назад

The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.

nvd
около 16 лет назад

The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.

debian
около 16 лет назад

The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 ...

github
больше 3 лет назад

The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.

EPSS

Процентиль: 9%
0.00032
Низкий

1.2 Low

CVSS2