CVE-2012-2737

The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.
References
Link Resource
http://cgit.freedesktop.org/accountsservice/commit/?id=26213aa0e0d8dca5f36cc23f6942525224cbe9f5 Exploit Patch
http://cgit.freedesktop.org/accountsservice/commit/?id=27f3d93a82fde4f6c7ab54f3f008af04f93f9c69
http://cgit.freedesktop.org/accountsservice/commit/?id=4c5b12e363410e490e776e4b4a86dcce157a543d Exploit Patch
http://cgit.freedesktop.org/accountsservice/commit/?id=bd51aa4cdac380f55d607f4ffdf2ab3c00d08721 Exploit Patch
http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083359.html
http://osvdb.org/83398
http://secunia.com/advisories/49695 Vendor Advisory
http://secunia.com/advisories/49759 Vendor Advisory
http://www.openwall.com/lists/oss-security/2012/06/28/9
http://www.securityfocus.com/bid/54223
http://www.ubuntu.com/usn/USN-1485-1
https://bugzilla.redhat.com/show_bug.cgi?id=832532
https://exchange.xforce.ibmcloud.com/vulnerabilities/76648
https://hermes.opensuse.org/messages/15100967
http://cgit.freedesktop.org/accountsservice/commit/?id=26213aa0e0d8dca5f36cc23f6942525224cbe9f5 Exploit Patch
http://cgit.freedesktop.org/accountsservice/commit/?id=27f3d93a82fde4f6c7ab54f3f008af04f93f9c69
http://cgit.freedesktop.org/accountsservice/commit/?id=4c5b12e363410e490e776e4b4a86dcce157a543d Exploit Patch
http://cgit.freedesktop.org/accountsservice/commit/?id=bd51aa4cdac380f55d607f4ffdf2ab3c00d08721 Exploit Patch
http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083359.html
http://osvdb.org/83398
http://secunia.com/advisories/49695 Vendor Advisory
http://secunia.com/advisories/49759 Vendor Advisory
http://www.openwall.com/lists/oss-security/2012/06/28/9
http://www.securityfocus.com/bid/54223
http://www.ubuntu.com/usn/USN-1485-1
https://bugzilla.redhat.com/show_bug.cgi?id=832532
https://exchange.xforce.ibmcloud.com/vulnerabilities/76648
https://hermes.opensuse.org/messages/15100967
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ray_stode:accountsservice:*:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.4:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.5:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.4:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.5:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.6:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.7:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.8:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.9:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.10:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.11:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.12:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.13:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.14:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.15:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.16:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.17:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.18:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.19:*:*:*:*:*:*:*
cpe:2.3:a:ray_stode:accountsservice:0.6.20:*:*:*:*:*:*:*

History

21 Nov 2024, 01:39

Type Values Removed Values Added
References () http://cgit.freedesktop.org/accountsservice/commit/?id=26213aa0e0d8dca5f36cc23f6942525224cbe9f5 - Exploit, Patch () http://cgit.freedesktop.org/accountsservice/commit/?id=26213aa0e0d8dca5f36cc23f6942525224cbe9f5 - Exploit, Patch
References () http://cgit.freedesktop.org/accountsservice/commit/?id=27f3d93a82fde4f6c7ab54f3f008af04f93f9c69 - () http://cgit.freedesktop.org/accountsservice/commit/?id=27f3d93a82fde4f6c7ab54f3f008af04f93f9c69 -
References () http://cgit.freedesktop.org/accountsservice/commit/?id=4c5b12e363410e490e776e4b4a86dcce157a543d - Exploit, Patch () http://cgit.freedesktop.org/accountsservice/commit/?id=4c5b12e363410e490e776e4b4a86dcce157a543d - Exploit, Patch
References () http://cgit.freedesktop.org/accountsservice/commit/?id=bd51aa4cdac380f55d607f4ffdf2ab3c00d08721 - Exploit, Patch () http://cgit.freedesktop.org/accountsservice/commit/?id=bd51aa4cdac380f55d607f4ffdf2ab3c00d08721 - Exploit, Patch
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083359.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083359.html -
References () http://osvdb.org/83398 - () http://osvdb.org/83398 -
References () http://secunia.com/advisories/49695 - Vendor Advisory () http://secunia.com/advisories/49695 - Vendor Advisory
References () http://secunia.com/advisories/49759 - Vendor Advisory () http://secunia.com/advisories/49759 - Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2012/06/28/9 - () http://www.openwall.com/lists/oss-security/2012/06/28/9 -
References () http://www.securityfocus.com/bid/54223 - () http://www.securityfocus.com/bid/54223 -
References () http://www.ubuntu.com/usn/USN-1485-1 - () http://www.ubuntu.com/usn/USN-1485-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=832532 - () https://bugzilla.redhat.com/show_bug.cgi?id=832532 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/76648 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/76648 -
References () https://hermes.opensuse.org/messages/15100967 - () https://hermes.opensuse.org/messages/15100967 -

Information

Published : 2012-07-22 17:55

Updated : 2024-11-21 01:39


NVD link : CVE-2012-2737

Mitre link : CVE-2012-2737

CVE.ORG link : CVE-2012-2737


JSON object : View

Products Affected

ray_stode

  • accountsservice
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')