First published: Thu Dec 06 2012(Updated: )
A TOCTOU (time-of-check time-of-use) race condition was found in the way libuser, a user and group account administration library, performed copying and removal of (user) directory trees. A local attacker, with permissions to write into particular directory, could use this flaw to conduct symbolic link attacks, leading to their ability to alter / remove directories outside of this directory (tree), if this directory was simultaneously modified (copied or removed) via libuser functionality. This issue was found by Florian Weimer of Red Hat Product Security Team.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libuser | 1:0.62~dfsg-0.4 1:0.64~dfsg-1 1:0.64~dfsg-2 | |
SUSE Libuser | =0.57 | |
SUSE Libuser | =0.58 | |
Fedora | =18 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5630 is classified as a moderate severity vulnerability due to its local exploitation vector.
To fix CVE-2012-5630, upgrade libuser to the latest version provided by your operating system's package manager.
CVE-2012-5630 affects installations of libuser version 0.57 and earlier, along with specific Debian and Fedora versions.
A local attacker can exploit CVE-2012-5630 to conduct symbolic link attacks, leading to unauthorized access to user directory trees.
No, CVE-2012-5630 is not a network-based vulnerability; it requires local access to exploit.