CVE-2011-0523 Details

CVE-2011-0523

Published: 2012-08-13
Last Modified: 2013-12-13
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

gypsy 0.8 does not properly restrict the files that can be read while running with root privileges, which allows local users to read otherwise restricted files via unspecified vectors.

Analysis
Common Vulnerability Score System v2.0
Severity Low
Base Score 1.9/10
Exploit Score 3.4/10
Access Vector Local
Access Complexity Medium
Authentication None
Impact Score 2.9/10
Confidentiality Impact Partial
Availability Impact None
Integrity Impact None
Vector String AV:L/AC:M/Au:N/C:P/I:N/A:N
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:iain:gypsy:0.8:*:*:*:*:*:*:* Yes - -
References

http://cgit.freedesktop.org/gypsy/commit/?id=40101707cddb319481133b2a137294b6b669bd16
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106919.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106927.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/107020.html
http://lists.opensuse.org/opensuse-updates/2012-07/msg00034.html
http://secunia.com/advisories/49991
http://www.openwall.com/lists/oss-security/2011/01/24/10
http://www.openwall.com/lists/oss-security/2011/01/25/10
https://bugs.freedesktop.org/show_bug.cgi?id=33431
https://bugs.launchpad.net/ubuntu/+source/gypsy/+bug/690323

CVE ID
CVE-2011-0523
Published
2012-08-13
Modified
2013-12-13
CVSSv2.0
Low
PCI Compliance
Pass
US-CERT Alert
No
CWE
CWE-264

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.