Centrify Deployment Manager 2.1.0.283, as distributed in Centrify Suite before 2012.5, allows local users to (1) overwrite arbitrary files via a symlink attack on the adcheckDMoutput temporary file, or (2) overwrite arbitrary files and consequently gain privileges via a symlink attack on the centrify.cmd.0 temporary file.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2012-12/0036.html - | |
References | () http://archives.neohapsis.com/archives/bugtraq/2012-12/0037.html - | |
References | () http://archives.neohapsis.com/archives/bugtraq/2012-12/0071.html - | |
References | () http://archives.neohapsis.com/archives/bugtraq/2012-12/0097.html - | |
References | () http://archives.neohapsis.com/archives/bugtraq/2012-12/0113.html - | |
References | () http://vapid.dhs.org/advisories/centrify_deployment_manager_insecure_tmp2.html - | |
References | () http://vapid.dhs.org/exploits/centrify_local_r00t.c - |
Information
Published : 2013-01-04 21:55
Updated : 2024-11-21 01:46
NVD link : CVE-2012-6348
Mitre link : CVE-2012-6348
CVE.ORG link : CVE-2012-6348
JSON object : View
Products Affected
centrify
- centrify_deployment_manager
- centrify_suite
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')