First published: Thu May 22 2014(Updated: )
gdm/guest-session-cleanup.sh in gdm-guest-session 0.24 and earlier, as used in Ubuntu Linux 10.04 LTS, 10.10, and 11.04, allows local users to delete arbitrary files via a space in the name of a file in /tmp. NOTE: this identifier was SPLIT from CVE-2012-0943 per ADT1/ADT2 due to different codebases and affected versions. CVE-2012-0943 is used for the guest-account issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
gdm-guest-session | <=0.24 | |
gdm-guest-session | =0.20 | |
gdm-guest-session | =0.21 | |
gdm-guest-session | =0.22 | |
gdm-guest-session | =0.23 | |
Ubuntu | =10.04 | |
Ubuntu | =10.10 | |
Ubuntu | =11.04 | |
<=0.24 | ||
=0.20 | ||
=0.21 | ||
=0.22 | ||
=0.23 | ||
=10.04 | ||
=10.10 | ||
=11.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6648 has a medium severity level as it allows local users to delete arbitrary files.
To fix CVE-2012-6648, upgrade gdm-guest-session to version 0.25 or later.
Versions of gdm-guest-session up to and including 0.24 are affected by CVE-2012-6648.
CVE-2012-6648 is significant on Ubuntu Linux 10.04 LTS, 10.10, and 11.04.
Exploiting CVE-2012-6648 allows local users to delete arbitrary files, potentially leading to data loss or system disruption.