Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-4472

Опубликовано: 26 окт. 2013
Источник: redhat
CVSS2: 1.9
EPSS Низкий

Описание

The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

Отчет

Not Vulnerable. This issue does not affect the version of poppler as shipped with Red Hat Enterprise Linux 5 and 6.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5popplerNot affected
Red Hat Enterprise Linux 6popplerNot affected
Red Hat Enterprise Linux 7popplerNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-377

EPSS

Процентиль: 21%
0.0007
Низкий

1.9 Low

CVSS2

Связанные уязвимости

ubuntu
почти 12 лет назад

The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

nvd
почти 12 лет назад

The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

debian
почти 12 лет назад

The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 a ...

github
больше 3 лет назад

The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

EPSS

Процентиль: 21%
0.0007
Низкий

1.9 Low

CVSS2