Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-2027

Опубликовано: 03 апр. 2013
Источник: redhat
CVSS2: 3.7
EPSS Низкий

Описание

Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.

Отчет

This issue affects the versions of jython as shipped with Red Hat Enterprise Linux version 5 and 6. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6jythonWill not fix
Red Hat JBoss Enterprise Application Platform 6jythonWill not fix
Red Hat JBoss SOA Platform 4.3jythonWill not fix
Red Hat JBoss SOA Platform 5jythonWill not fix
Red Hat Satellite 5.4jythonWill not fix
Red Hat Satellite 5.5jythonWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-732
https://bugzilla.redhat.com/show_bug.cgi?id=947949Jython creates executables class files with wrong permissions

EPSS

Процентиль: 5%
0.00021
Низкий

3.7 Low

CVSS2

Связанные уязвимости

ubuntu
почти 11 лет назад

Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.

nvd
почти 11 лет назад

Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.

debian
почти 11 лет назад

Jython 2.2.1 uses the current umask to set the privileges of the class ...

github
больше 3 лет назад

Jython Improper Access Restrictions vulnerability

EPSS

Процентиль: 5%
0.00021
Низкий

3.7 Low

CVSS2