Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-3827

Опубликовано: 27 дек. 2018
Источник: redhat
CVSS3: 7

Описание

An incorrect permission check in the admin backend in gvfs before version 1.39.4 was found that allows reading and modify arbitrary files by privileged users without asking for password when no authentication agent is running. This vulnerability can be exploited by malicious programs running under privileges of users belonging to the wheel group to further escalate its privileges by modifying system files without user's knowledge. Successful exploitation requires uncommon system configuration.

An incorrect permission check in the admin backend in gvfs was found that allows reading and modify arbitrary files by privileged users without asking for password when no authentication agent is running. This vulnerability can be exploited by malicious programs running under privileges of users belonging to the wheel group to further escalate its privileges by modifying system files without user's knowledge. Successful exploitation requires uncommon system configuration.

Отчет

This issue did not affect the versions of gvfs as shipped with Red Hat Enterprise Linux 6 as they did not include support for admin backend.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6gvfsNot affected
Red Hat Enterprise Linux 7gvfsFixedRHSA-2019:214506.08.2019
Red Hat Enterprise Linux 8gvfsFixedRHSA-2019:151718.06.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-863
https://bugzilla.redhat.com/show_bug.cgi?id=1665578gvfs: Incorrect authorization in admin backend allows privileged users to read and modify arbitrary files without prompting for password

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
ubuntu
почти 7 лет назад

An incorrect permission check in the admin backend in gvfs before version 1.39.4 was found that allows reading and modify arbitrary files by privileged users without asking for password when no authentication agent is running. This vulnerability can be exploited by malicious programs running under privileges of users belonging to the wheel group to further escalate its privileges by modifying system files without user's knowledge. Successful exploitation requires uncommon system configuration.

CVSS3: 7
nvd
почти 7 лет назад

An incorrect permission check in the admin backend in gvfs before version 1.39.4 was found that allows reading and modify arbitrary files by privileged users without asking for password when no authentication agent is running. This vulnerability can be exploited by malicious programs running under privileges of users belonging to the wheel group to further escalate its privileges by modifying system files without user's knowledge. Successful exploitation requires uncommon system configuration.

CVSS3: 7
debian
почти 7 лет назад

An incorrect permission check in the admin backend in gvfs before vers ...

suse-cvrf
почти 7 лет назад

Security update for gvfs

suse-cvrf
почти 7 лет назад

Security update for gvfs

7 High

CVSS3