Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-1962

Опубликовано: 08 июн. 2009
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.4

Описание

Xfig, possibly 3.2.5, allows local users to read and write arbitrary files via a symlink attack on the (1) xfig-eps[PID], (2) xfig-pic[PID].pix, (3) xfig-pic[PID].err, (4) xfig-pcx[PID].pix, (5) xfig-xfigrc[PID], (6) xfig[PID], (7) xfig-print[PID], (8) xfig-export[PID].err, (9) xfig-batch[PID], (10) xfig-exp[PID], or (11) xfig-spell.[PID] temporary files, where [PID] is a process ID.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

1:3.2.6a-2
cosmic

ignored

end of life
dapper

ignored

end of life
devel

not-affected

1:3.2.8-3
disco

ignored

end of life
eoan

ignored

end of life
esm-apps/bionic

not-affected

1:3.2.6a-2
esm-apps/focal

not-affected

1:3.2.7b-2
esm-apps/jammy

not-affected

1:3.2.8-3

Показывать по

EPSS

Процентиль: 26%
0.00091
Низкий

4.4 Medium

CVSS2

Связанные уязвимости

redhat
почти 17 лет назад

Xfig, possibly 3.2.5, allows local users to read and write arbitrary files via a symlink attack on the (1) xfig-eps[PID], (2) xfig-pic[PID].pix, (3) xfig-pic[PID].err, (4) xfig-pcx[PID].pix, (5) xfig-xfigrc[PID], (6) xfig[PID], (7) xfig-print[PID], (8) xfig-export[PID].err, (9) xfig-batch[PID], (10) xfig-exp[PID], or (11) xfig-spell.[PID] temporary files, where [PID] is a process ID.

nvd
больше 16 лет назад

Xfig, possibly 3.2.5, allows local users to read and write arbitrary files via a symlink attack on the (1) xfig-eps[PID], (2) xfig-pic[PID].pix, (3) xfig-pic[PID].err, (4) xfig-pcx[PID].pix, (5) xfig-xfigrc[PID], (6) xfig[PID], (7) xfig-print[PID], (8) xfig-export[PID].err, (9) xfig-batch[PID], (10) xfig-exp[PID], or (11) xfig-spell.[PID] temporary files, where [PID] is a process ID.

debian
больше 16 лет назад

Xfig, possibly 3.2.5, allows local users to read and write arbitrary f ...

github
почти 4 года назад

Xfig, possibly 3.2.5, allows local users to read and write arbitrary files via a symlink attack on the (1) xfig-eps[PID], (2) xfig-pic[PID].pix, (3) xfig-pic[PID].err, (4) xfig-pcx[PID].pix, (5) xfig-xfigrc[PID], (6) xfig[PID], (7) xfig-print[PID], (8) xfig-export[PID].err, (9) xfig-batch[PID], (10) xfig-exp[PID], or (11) xfig-spell.[PID] temporary files, where [PID] is a process ID.

EPSS

Процентиль: 26%
0.00091
Низкий

4.4 Medium

CVSS2