DistUpgrade/DistUpgradeMain.py in Update Manager, as used by Ubuntu 12.04 LTS, 11.10, and 11.04, uses weak permissions for (1) apt-clone_system_state.tar.gz and (2) system_state.tar.gz, which allows local users to obtain repository credentials.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://launchpadlibrarian.net/105380733/update-manager_1%3A0.156.14.3_1%3A0.156.14.4.diff.gz - | |
References | () http://osvdb.org/82019 - | |
References | () http://secunia.com/advisories/49230 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/53604 - | |
References | () http://www.ubuntu.com/usn/USN-1443-1 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/75727 - |
Information
Published : 2012-06-07 21:55
Updated : 2024-11-21 01:36
NVD link : CVE-2012-0948
Mitre link : CVE-2012-0948
CVE.ORG link : CVE-2012-0948
JSON object : View
Products Affected
gnome
- update-manager-core
canonical
- ubuntu_linux
CWE
CWE-264
Permissions, Privileges, and Access Controls