First published: Mon Dec 17 2012(Updated: )
A race condition was found in the way abrt handled the directories used to store information about crashes. A local attacker with the privileges of the abrt user could use this flaw to perform a symbolic link attack, allowing them to make any file writable by the abrt user, allowing them to escalate their privileges to the privileged system user account, root. This issue was assigned <a href="https://access.redhat.com/security/cve/CVE-2012-5660">CVE-2012-5660</a>. Acknowledgements: Red Hat would like to thank Martin Carpenter of Citco for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Automatic Bug Reporting Tool | <=2.0.9 | |
Redhat Automatic Bug Reporting Tool | =2.0.0 | |
Redhat Automatic Bug Reporting Tool | =2.0.1 | |
Redhat Automatic Bug Reporting Tool | =2.0.2 | |
Redhat Automatic Bug Reporting Tool | =2.0.3 | |
Redhat Automatic Bug Reporting Tool | =2.0.4 | |
Redhat Automatic Bug Reporting Tool | =2.0.4.980 | |
Redhat Automatic Bug Reporting Tool | =2.0.4.981 | |
Redhat Automatic Bug Reporting Tool | =2.0.5 | |
Redhat Automatic Bug Reporting Tool | =2.0.6 | |
Redhat Automatic Bug Reporting Tool | =2.0.7 | |
Redhat Automatic Bug Reporting Tool | =2.0.8 |
http://git.fedorahosted.org/cgit/libreport.git/commit/?id=3bbf961b1884dd32654dd39b360dd78ef294b10a
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.