Vulnerability Details : CVE-2008-2232
The expand_template function in afuse.c in afuse 0.2 allows local users to gain privileges via shell metacharacters in a pathname.
Products affected by CVE-2008-2232
- cpe:2.3:a:afuse:afuse:0.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-2232
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 17 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-2232
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
CWE ids for CVE-2008-2232
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-2232
-
http://secunia.com/advisories/31131
About Secunia Research | Flexera
-
http://secunia.com/advisories/31086
About Secunia Research | FlexeraVendor Advisory
-
http://secunia.com/advisories/36358
About Secunia Research | Flexera
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490921
#490921 - CVE-2008-2232: privilege escalation - Debian Bug report logs
-
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00921.html
[SECURITY] Fedora 10 Update: afuse-0.2-4.fc10
-
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00947.html
[SECURITY] Fedora 11 Update: afuse-0.2-4.fc11
-
http://www.securityfocus.com/bid/30245
-
http://www.debian.org/security/2008/dsa-1611
[SECURITY] [DSA 1611-1] New afuse packages fix privilege escalation
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/43834
Afuse filenames command execution CVE-2008-2232 Vulnerability Report
Jump to