First published: Mon Dec 10 2012(Updated: )
An information disclosure flaw was found in the way libuser, an user and group account administration library, performed movement of user's home directory. Previously, during the move the ownership of all the (sub)entries present in directory tree, to be moved, were changed from privileged user account to the effective user id of the user, the home directory should belong to. A local attacker could use this flaw to conduct hardlink attacks and possibly obtain unauthorized access to arbitrary system file. This issue was found by Miloslav Trmač of Red Hat.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libuser | 1:0.62~dfsg-0.4 1:0.64~dfsg-1 1:0.64~dfsg-2 | |
SUSE Libuser | ||
Debian | =8.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
Fedora | =18 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5644 presents an information disclosure risk that can lead to unauthorized access to users' home directories.
CVE-2012-5644 affects versions of libuser on Debian and Red Hat Enterprise Linux systems.
To mitigate CVE-2012-5644, ensure that you upgrade to the patched versions of libuser as specified in the advisory.
Exploiting CVE-2012-5644 could allow attackers to gain access to sensitive information within user home directories.
CVE-2012-5644 is classified as a medium-severity vulnerability, but it can lead to significant data exposure if not addressed.