Vulnerability Details : CVE-2012-1093
The init script in the Debian x11-common package before 1:7.6+12 is vulnerable to a symlink attack that can lead to a privilege escalation during package installation.
Vulnerability category: Gain privilege
Products affected by CVE-2012-1093
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:debian:x11-common:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-1093
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 37 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-1093
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2012-1093
-
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-1093
-
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
[jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar - Pony Mail
-
https://security-tracker.debian.org/tracker/CVE-2012-1093
CVE-2012-1093Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2012/03/01/1
oss-security - Re: CVE request: init script x11-common creates directories in insecure mannersMailing List;Third Party Advisory
-
http://vladz.devzero.fr/012_x11-common-vuln.html
[vladz.devzero.fr]Exploit;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2012/02/29/1
oss-security - Re: CVE request: init script x11-common creates directories in insecure mannersExploit;Mailing List;Third Party Advisory
Jump to