First published: Wed Dec 05 2012(Updated: )
Race condition in the RunAsManager mechanism in VMware SpringSource Spring Security before 2.0.7 and 3.0.x before 3.0.6 stores the Authentication object in the shared security context, which allows attackers to gain privileges via a crafted thread.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Spring Security | =3.0.0 | |
VMware Spring Security | =3.0.2 | |
VMware Spring Security | =2.0.3 | |
VMware Spring Security | <=3.0.5 | |
VMware Spring Security | <=2.0.6 | |
VMware Spring Security | =2.0.5 | |
VMware Spring Security | =2.0.2 | |
VMware Spring Security | =2.0.0 | |
VMware Spring Security | =3.0.3 | |
VMware Spring Security | =2.0.1 | |
VMware Spring Security | =3.0.1 | |
VMware Spring Security | =2.0.4 | |
VMware Spring Security | =3.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2731 has a high severity due to its potential for privilege escalation.
To fix CVE-2011-2731, upgrade VMware SpringSource Spring Security to version 2.0.7 or 3.0.6 or later.
CVE-2011-2731 affects VMware Spring Security versions up to and including 2.0.6 and 3.0.5.
Yes, CVE-2011-2731 can be exploited remotely by an attacker with malicious crafted threads.
CVE-2011-2731 is a race condition vulnerability that allows attackers to gain elevated privileges.