First published: Tue Jul 03 2012(Updated: )
The C handler plug-in in Automatic Bug Reporting Tool (ABRT), possibly 2.0.8 and earlier, does not properly set the group (GID) permissions on core dump files for setuid programs when the sysctl fs.suid_dumpable option is set to 2, which allows local users to obtain sensitive information.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Automatic Bug Reporting Tool | <=2.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1106 has been classified as a high severity vulnerability due to the potential exposure of sensitive information.
To fix CVE-2012-1106, upgrade the Automatic Bug Reporting Tool to version 2.0.8 or later where the issue is resolved.
CVE-2012-1106 affects versions of the Automatic Bug Reporting Tool prior to 2.0.8 that improperly handle GID permissions on core dump files.
Yes, local users can exploit CVE-2012-1106 to access sensitive information due to improper permissions on core dump files.
The primary cause of CVE-2012-1106 is that the C handler plug-in in Automatic Bug Reporting Tool fails to correctly set GID permissions.