Be in love with vulnerability scanning

Mageni is a powerful and easy vulnerability scanner used by companies of all sizes. You will be in love with Mageni's powerful features, ease of use and price. Free for 7-days then $39 monthly for infinite IPs.

Start now 

No Contracts, Cancel at Anytime and 7-days Money-Back Guarantee.

App screenshot

CVE-2009-5081

CVE information

Published

10 years ago

Last Modified

8 years ago

CVSSv2.0 Severity

Low

Impact Analysis

Description

The (1) config.guess, (2) contrib/groffer/perl/groffer.pl, and (3) contrib/groffer/perl/roff2.pl scripts in GNU troff (aka groff) 1.21 and earlier use an insufficient number of X characters in the template argument to the tempfile function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file, a different vulnerability than CVE-2004-0969..

CVSSv2.0 Score

Severity
Low
Base Score
3.3/10
Exploit Score
3.4/10
Access Vector
Local
Access Complexity
Medium
Authentication Required
None
Impact Score
4.9/10
Confidentiality Impact
None
Availability Impact
Partial
Integrity Impact
Partial

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:gnu:groff:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:gnu:groff:1.16.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:gnu:groff:1.16:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:gnu:groff:1.19.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:gnu:groff:1.18.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:gnu:groff:1.11a:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:gnu:groff:1.19.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:gnu:groff:1.20:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:gnu:groff:1.19:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:gnu:groff:1.20.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:gnu:groff:1.15:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:gnu:groff:1.17.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:gnu:groff:1.17.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:gnu:groff:1.14:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:gnu:groff:1.10:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:gnu:groff:1.11:*:*:*:*:*:*:*
  Yes
- -

Every 11 seconds there is a ransomware attack.

Mageni can help you manage this threat by understanding your vulnerabilities and prioritizing the remediation.

Sign up for free