CVE-2010-0792 (GCVE-0-2010-0792)
Vulnerability from cvelistv5 – Published: 2010-03-05 19:00 – Updated: 2024-08-07 00:59
VLAI?
Summary
fcrontab in fcron before 3.0.5 allows local users to read arbitrary files via a symlink attack on an unspecified file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:59:39.311Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2010-0730",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/0730"
},
{
"name": "39195",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/39195"
},
{
"name": "FEDORA-2010-4063",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/038150.html"
},
{
"name": "20100304 fcrontab Information Disclosure Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/509873/100/0/threaded"
},
{
"name": "1023677",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1023677"
},
{
"name": "fcron-fcrontab-symlink(56680)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56680"
},
{
"name": "62718",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/62718"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://fcron.free.fr/"
},
{
"name": "20100303 fcrontab Information Disclosure Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2010/Mar/97"
},
{
"name": "38796",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/38796"
},
{
"name": "38531",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/38531"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-03-03T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "fcrontab in fcron before 3.0.5 allows local users to read arbitrary files via a symlink attack on an unspecified file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-10T18:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2010-0730",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/0730"
},
{
"name": "39195",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/39195"
},
{
"name": "FEDORA-2010-4063",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/038150.html"
},
{
"name": "20100304 fcrontab Information Disclosure Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/509873/100/0/threaded"
},
{
"name": "1023677",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1023677"
},
{
"name": "fcron-fcrontab-symlink(56680)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56680"
},
{
"name": "62718",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/62718"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://fcron.free.fr/"
},
{
"name": "20100303 fcrontab Information Disclosure Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2010/Mar/97"
},
{
"name": "38796",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/38796"
},
{
"name": "38531",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/38531"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-0792",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "fcrontab in fcron before 3.0.5 allows local users to read arbitrary files via a symlink attack on an unspecified file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2010-0730",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0730"
},
{
"name": "39195",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39195"
},
{
"name": "FEDORA-2010-4063",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-March/038150.html"
},
{
"name": "20100304 fcrontab Information Disclosure Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/509873/100/0/threaded"
},
{
"name": "1023677",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1023677"
},
{
"name": "fcron-fcrontab-symlink(56680)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56680"
},
{
"name": "62718",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/62718"
},
{
"name": "http://fcron.free.fr/",
"refsource": "CONFIRM",
"url": "http://fcron.free.fr/"
},
{
"name": "20100303 fcrontab Information Disclosure Vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2010/Mar/97"
},
{
"name": "38796",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38796"
},
{
"name": "38531",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38531"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-0792",
"datePublished": "2010-03-05T19:00:00",
"dateReserved": "2010-03-02T00:00:00",
"dateUpdated": "2024-08-07T00:59:39.311Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2010-0792\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2010-03-05T19:30:00.750\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"fcrontab in fcron before 3.0.5 allows local users to read arbitrary files via a symlink attack on an unspecified file.\"},{\"lang\":\"es\",\"value\":\"fcrontab en fcron anteriores a v3.0.5 permite a usuarios locales leer ficheros arbitrarios a traves de un ataque de enlace simbolico en un fichero sin especificar.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":1.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.4,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-59\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.0.4\",\"matchCriteriaId\":\"B033B9C5-D40D-48AE-8274-B13F5AE36DEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:0.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C01C8366-5998-4485-9988-039DCF7B7300\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:0.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"694A36E2-E073-435A-AAD2-5375BE940478\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:0.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16E3A07A-B452-49BC-A3B9-28284EC4CA75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:0.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE37E7FE-2842-4A70-ADCA-5097E8C6084C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:0.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BB18DA1-F7AD-4682-9DFD-9FCE7B0613B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:0.9.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FD7CBDC-1105-4B69-96CF-39BE75FB8AA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:0.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1404FC9C-8A3C-4C2F-AD38-1D7242C70931\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:0.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E99F145-D38D-4AA9-B606-1D4485D30C6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:0.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94A6ACC7-38F2-4B04-AF9B-6ED147E84CBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA525E2A-9A55-4303-B8F6-6E7DAD72F8D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33209027-8F78-454A-AB15-98B5B4807971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FF27805-A01B-4CC1-81A8-BD3F171D56F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F31E9E74-B495-4F3E-89FE-1EBE60C0486E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C06DA19-4B3D-4BC5-9B88-3D5346CC4513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A92397D2-E744-4133-9098-314EED98AE6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AA0427D-62A7-4C86-B25A-0AA7BD0EEED9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC6BD83-D454-4FD8-904D-0A7C083F7AD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5BCC775-5CDF-4F02-A4E1-8F2F0DC5D1F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AC645B9-6FDA-4E52-A412-2D981DFACA9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:2.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1C47C7A-25E0-44A3-9485-AD0948E3226D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:2.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C4E9E78-47DB-40A7-8AF0-AD5F4CDF2E9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:2.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F2726B0-CCE2-476A-A5A3-2844BCB494F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:2.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB1B637E-B22F-4879-86C6-8814C137F2F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:2.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2688EE86-C1A6-466B-B52E-11CFAE118335\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:2.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CEDC35B-0C09-410A-8708-B7DE23E65CFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:2.9.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D865B55-8057-4AD0-9CBF-1FA4254E76EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:2.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1E2A256-03AF-4575-B6D8-BE2553391CE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:2.9.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FB9A95E-F338-4A23-91F9-1A6799B825B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53632767-EDB4-4AF0-A23A-32A6636A64EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D2F639F-8F5A-4B82-995A-49D5674E8B79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B786418-B64D-4BAC-9CD9-3268D68EB4B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBCD65D6-4DED-452F-9BFE-92CAC1CA0203\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thibault_godouet:fcron:3.0.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECBC68E1-C142-47BE-820F-8781C4C35452\"}]}]}],\"references\":[{\"url\":\"http://fcron.free.fr/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-March/038150.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://seclists.org/fulldisclosure/2010/Mar/97\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/38796\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/39195\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1023677\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/62718\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/509873/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/38531\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0730\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/56680\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://fcron.free.fr/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-March/038150.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2010/Mar/97\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/38796\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/39195\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1023677\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/62718\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/509873/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/38531\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0730\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/56680\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…