CVE-2009-3289

The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnome:glib:2.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:11:-:*:*:*:*:*:*

History

21 Nov 2024, 01:06

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html - Third Party Advisory
References () http://secunia.com/advisories/39656 - Broken Link () http://secunia.com/advisories/39656 - Broken Link
References () http://www.openwall.com/lists/oss-security/2009/09/08/8 - Mailing List () http://www.openwall.com/lists/oss-security/2009/09/08/8 - Mailing List
References () http://www.vupen.com/english/advisories/2010/1001 - Permissions Required () http://www.vupen.com/english/advisories/2010/1001 - Permissions Required
References () https://bugs.launchpad.net/ubuntu/+source/glib2.0/+bug/418135 - Exploit, Issue Tracking () https://bugs.launchpad.net/ubuntu/+source/glib2.0/+bug/418135 - Exploit, Issue Tracking
References () https://bugzilla.gnome.org/show_bug.cgi?id=593406 - Exploit, Issue Tracking () https://bugzilla.gnome.org/show_bug.cgi?id=593406 - Exploit, Issue Tracking

08 Feb 2024, 14:56

Type Values Removed Values Added
References (MLIST) http://www.openwall.com/lists/oss-security/2009/09/08/8 - (MLIST) http://www.openwall.com/lists/oss-security/2009/09/08/8 - Mailing List
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html - Third Party Advisory
References (MISC) https://bugzilla.gnome.org/show_bug.cgi?id=593406 - Exploit (MISC) https://bugzilla.gnome.org/show_bug.cgi?id=593406 - Exploit, Issue Tracking
References (SECUNIA) http://secunia.com/advisories/39656 - (SECUNIA) http://secunia.com/advisories/39656 - Broken Link
References (CONFIRM) https://bugs.launchpad.net/ubuntu/+source/glib2.0/+bug/418135 - Exploit (CONFIRM) https://bugs.launchpad.net/ubuntu/+source/glib2.0/+bug/418135 - Exploit, Issue Tracking
References (VUPEN) http://www.vupen.com/english/advisories/2010/1001 - (VUPEN) http://www.vupen.com/english/advisories/2010/1001 - Permissions Required
CPE cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:11:-:*:*:*:*:*:*
CWE CWE-264 CWE-732
First Time Suse
Opensuse
Opensuse opensuse
Suse suse Linux Enterprise Server
CVSS v2 : 4.4
v3 : unknown
v2 : 4.4
v3 : 7.8

Information

Published : 2009-09-22 10:30

Updated : 2024-11-21 01:06


NVD link : CVE-2009-3289

Mitre link : CVE-2009-3289

CVE.ORG link : CVE-2009-3289


JSON object : View

Products Affected

suse

  • suse_linux_enterprise_server

opensuse

  • opensuse

gnome

  • glib
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource