Vulnerability Details : CVE-2009-4135
The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.
Products affected by CVE-2009-4135
- cpe:2.3:a:gnu:coreutils:5.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:5.97:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:6.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:6.11:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:6.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:6.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:7.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:8.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:5.93:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:5.94:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:6.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:6.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:7.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:7.3:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:5.91:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:5.92:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:6.12:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:6.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:6.9:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:5.95:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:5.96:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:6.5:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:6.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:7.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:coreutils:7.5:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-4135
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-4135
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.4
|
MEDIUM | AV:L/AC:M/Au:N/C:P/I:P/A:P |
3.4
|
6.4
|
NIST |
CWE ids for CVE-2009-4135
-
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2009-4135
-
Red Hat 2010-02-26This issue does not affect users using coreutils binary RPMs, or rebuilding source RPMs. Therefore, we do not plan to release updates addressing this flaw on Red Hat Enterprise Linux 3, 4 and 5. For additional details, refer to the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-4135
References for CVE-2009-4135
-
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00972.html
Third Party Advisory
-
http://www.mail-archive.com/bug-coreutils%40gnu.org/msg18787.html
-
http://www.ubuntu.com/usn/USN-2473-1
Third Party Advisory
-
http://www.vupen.com/english/advisories/2009/3453
Permissions Required
-
http://www.openwall.com/lists/oss-security/2009/12/08/4
Mailing List;Third Party Advisory
-
http://www.securityfocus.com/bid/37256
Third Party Advisory;VDB Entry
-
http://www.mail-archive.com/bug-coreutils%40gnu.org/msg18779.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/54673
-
http://marc.info/?l=oss-security&m=126030454503441&w=2
Mailing List;Patch;Third Party Advisory
-
http://git.savannah.gnu.org/cgit/coreutils.git/commit/?id=ae034822c535fa5
Issue Tracking;Patch
-
https://bugzilla.redhat.com/show_bug.cgi?id=545439
Issue Tracking;Patch
-
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00954.html
Third Party Advisory
Jump to