First published: Thu Jun 07 2012(Updated: )
The GridFTP in Globus Toolkit (GT) before 5.2.2, when certain autoconf macros are defined, does not properly check the return value from the getpwnam_r function, which might allow remote attackers to gain privileges by logging in with a user that does not exist, which causes GridFTP to run as the last user in the password file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Globus Toolkit | <=5.2.1 | |
Globus Toolkit | =2.0 | |
Globus Toolkit | =2.2 | |
Globus Toolkit | =2.4.3 | |
Globus Toolkit | =3.0.2 | |
Globus Toolkit | =3.2.1 | |
Globus Toolkit | =4.0.0 | |
Globus Toolkit | =4.0.1 | |
Globus Toolkit | =4.0.2 | |
Globus Toolkit | =4.0.3 | |
Globus Toolkit | =4.0.4 | |
Globus Toolkit | =4.0.5 | |
Globus Toolkit | =4.0.6 | |
Globus Toolkit | =4.0.7 | |
Globus Toolkit | =4.0.8 | |
Globus Toolkit | =4.2.0 | |
Globus Toolkit | =4.2.1 | |
Globus Toolkit | =5.0.0 | |
Globus Toolkit | =5.0.1 | |
Globus Toolkit | =5.0.2 | |
Globus Toolkit | =5.0.3 | |
Globus Toolkit | =5.0.4 | |
Globus Toolkit | =5.0.5 | |
Globus Toolkit | =5.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3292 has been classified as a high severity vulnerability due to the possibility of privilege escalation.
To mitigate CVE-2012-3292, upgrade the Globus Toolkit to version 5.2.2 or later.
CVE-2012-3292 affects Globus Toolkit versions 5.2.1 and earlier, as well as versions 2.x through 4.x.
Yes, CVE-2012-3292 can be exploited by remote attackers to gain elevated privileges.
CVE-2012-3292 involves a lack of proper return value checking from the getpwnam_r function.