First published: Tue Sep 22 2009(Updated: )
The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME libraries | =2.0 | |
openSUSE libeconf | =11.0 | |
openSUSE libeconf | =11.1 | |
SUSE Linux Enterprise Server | =11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3289 is considered to have a high severity due to the potential for user-assisted local users to modify files of other users.
To fix CVE-2009-3289, you should update GLib to a version that addresses this vulnerability.
CVE-2009-3289 affects users of GLib 2.0 and specific versions of openSUSE and SUSE Linux Enterprise Server.
The consequences of CVE-2009-3289 include unauthorized modification of files by local users due to incorrect permission settings.
CVE-2009-3289 is classified as a local vulnerability as it requires user assistance to exploit.