Vulnerability Details : CVE-2012-0950
The Apport hook (DistUpgradeApport.py) in Update Manager, as used by Ubuntu 12.04 LTS, 11.10, and 11.04, uploads the /var/log/dist-upgrade directory when reporting bugs to Launchpad, which allows remote attackers to read repository credentials by viewing a public bug report. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0949.
Vulnerability category: Information leak
Products affected by CVE-2012-0950
- cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
Threat overview for CVE-2012-0950
Top countries where our scanners detected CVE-2012-0950
Top open port discovered on systems with this issue
80
IPs affected by CVE-2012-0950 9
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2012-0950!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2012-0950
0.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-0950
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2012-0950
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-0950
-
https://bugs.launchpad.net/ubuntu/%2Bsource/update-manager/%2Bbug/1004503
Bug #1004503 “Incomplete fix for CVE-2012-0949” : Bugs : update-manager package : Ubuntu
-
http://www.ubuntu.com/usn/USN-1443-2
USN-1443-2: Update Manager vulnerability | Ubuntu security noticesVendor Advisory
Jump to