First published: Thu Jul 04 2019(Updated: )
deepin-clone before 1.1.3 uses a fixed path /tmp/repo.iso in the BootDoctor::fix() function to download an ISO file, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled. By winning a race condition to replace the /tmp/repo.iso symlink by an attacker controlled ISO file, further privilege escalation may be possible.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Deepin Clone | <1.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13228 is considered a medium severity vulnerability due to its potential for local privilege escalation through symlink attacks.
To fix CVE-2019-13228, upgrade deepin-clone to version 1.1.3 or later, which addresses the symlink vulnerability.
CVE-2019-13228 affects users of deepin-clone versions prior to 1.1.3.
CVE-2019-13228 is a symlink vulnerability that allows unprivileged users to overwrite files in arbitrary locations.
No, CVE-2019-13228 requires local access to exploit the symlink vulnerability.