Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-12210

Опубликовано: 04 июн. 2019
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.5
CVSS3: 8.1

Описание

In Yubico pam-u2f 1.0.7, when configured with debug and a custom debug log file is set using debug_file, that file descriptor is not closed when a new process is spawned. This leads to the file descriptor being inherited into the child process; the child process can then read from and write to it. This can leak sensitive information and also, if written to, be used to fill the disk or plant misinformation.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

not-affected

1.0.8-1
disco

ignored

end of life
eoan

not-affected

1.0.8-1
esm-apps/bionic

not-affected

vulnerable code not present
esm-apps/focal

not-affected

1.0.8-1
esm-apps/jammy

not-affected

1.0.8-1
esm-apps/noble

not-affected

1.0.8-1
esm-apps/xenial

not-affected

vulnerable code not present

Показывать по

EPSS

Процентиль: 62%
0.00423
Низкий

5.5 Medium

CVSS2

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
больше 6 лет назад

In Yubico pam-u2f 1.0.7, when configured with debug and a custom debug log file is set using debug_file, that file descriptor is not closed when a new process is spawned. This leads to the file descriptor being inherited into the child process; the child process can then read from and write to it. This can leak sensitive information and also, if written to, be used to fill the disk or plant misinformation.

CVSS3: 8.1
debian
больше 6 лет назад

In Yubico pam-u2f 1.0.7, when configured with debug and a custom debug ...

CVSS3: 8.1
github
больше 3 лет назад

In Yubico pam-u2f 1.0.7, when configured with debug and a custom debug log file is set using debug_file, that file descriptor is not closed when a new process is spawned. This leads to the file descriptor being inherited into the child process; the child process can then read from and write to it. This can leak sensitive information and also, if written to, be used to fill the disk or plant misinformation.

CVSS3: 8.1
fstec
больше 6 лет назад

Уязвимость PAM-модуля Yubico pam-u2f, связанная с отсутствием защиты служебных данных, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации

suse-cvrf
больше 6 лет назад

Security update for libu2f-host, pam_u2f

EPSS

Процентиль: 62%
0.00423
Низкий

5.5 Medium

CVSS2

8.1 High

CVSS3