FKIE_CVE-2012-2737

Vulnerability from fkie_nvd - Published: 2012-07-22 17:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.
References
secalert@redhat.comhttp://cgit.freedesktop.org/accountsservice/commit/?id=26213aa0e0d8dca5f36cc23f6942525224cbe9f5Exploit, Patch
secalert@redhat.comhttp://cgit.freedesktop.org/accountsservice/commit/?id=27f3d93a82fde4f6c7ab54f3f008af04f93f9c69
secalert@redhat.comhttp://cgit.freedesktop.org/accountsservice/commit/?id=4c5b12e363410e490e776e4b4a86dcce157a543dExploit, Patch
secalert@redhat.comhttp://cgit.freedesktop.org/accountsservice/commit/?id=bd51aa4cdac380f55d607f4ffdf2ab3c00d08721Exploit, Patch
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-July/083359.html
secalert@redhat.comhttp://osvdb.org/83398
secalert@redhat.comhttp://secunia.com/advisories/49695Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/49759Vendor Advisory
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/06/28/9
secalert@redhat.comhttp://www.securityfocus.com/bid/54223
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1485-1
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=832532
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/76648
secalert@redhat.comhttps://hermes.opensuse.org/messages/15100967
af854a3a-2127-422b-91ae-364da2661108http://cgit.freedesktop.org/accountsservice/commit/?id=26213aa0e0d8dca5f36cc23f6942525224cbe9f5Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://cgit.freedesktop.org/accountsservice/commit/?id=27f3d93a82fde4f6c7ab54f3f008af04f93f9c69
af854a3a-2127-422b-91ae-364da2661108http://cgit.freedesktop.org/accountsservice/commit/?id=4c5b12e363410e490e776e4b4a86dcce157a543dExploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://cgit.freedesktop.org/accountsservice/commit/?id=bd51aa4cdac380f55d607f4ffdf2ab3c00d08721Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083359.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/83398
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49695Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49759Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/06/28/9
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/54223
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1485-1
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=832532
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/76648
af854a3a-2127-422b-91ae-364da2661108https://hermes.opensuse.org/messages/15100967

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6D06E2-4F74-46DE-B9BF-1C97604CF021",
              "versionEndIncluding": "0.6.21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9723C9C-DCE0-4A70-BE21-F84BE744B170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E4E5A11-875E-4E50-B997-0CC42AA1529C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "654FD8F2-7ECA-486C-847E-C2EEC84BB3E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BFA6933-27FE-460E-9777-FEDDBDDEB493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D4D9B34-CD44-445B-A4A6-76ABD9FF3888",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69F9EAC8-F005-48A1-A214-A00A189650D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25F666F-DB6D-434E-9A6E-EA2116161D1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "01252CDF-C1E1-4252-800E-75BFE0D58F8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8DB9A31-507D-442D-BBB0-1A0BEEB2D8C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "493D8E98-684F-449E-BC99-DFAAA62A026C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "43265E3B-E946-414D-89CF-B9E6EE5928A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0200BD3-3F07-4730-957A-365DFF16C0CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "165A55CE-F24D-48A2-BF5C-82AD84A21863",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DF70F0E-9E79-4B31-83EF-C6CE2547EE36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9A8BE2A-F05B-47B8-9F81-83D6B58600E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "E67888F7-EEFC-416B-A7B2-0C316DF16F90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "888560B6-3983-48A6-83A7-6CE37A48B682",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBCABDCE-B8B8-4509-A2D9-CC2DF0DF577C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A298B5D-C081-4044-8D20-1312A02674A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF12AD26-C604-432E-ADEB-EC29AE570473",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE3C8201-8216-49C0-8216-AFE153DAEB47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "99310E73-890E-4313-9033-DC29B1DFCEAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ray_stode:accountsservice:0.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "47E3542C-0633-4083-A3EA-414C7E02EC97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n de user_change_icon_file_authorized_cb en /usr/libexec/accounts-daemon de las cuentas en AccountsService anterior a v0.6.22 no comprueba correctamente el UID al copiar un archivo de icono en el directorio de memoria cach\u00e9 del sistema, lo que permite a usuarios locales leer ficheros arbitrarios a trav\u00e9s de una condici\u00f3n de carrera."
    }
  ],
  "id": "CVE-2012-2737",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 1.9,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-07-22T17:55:02.913",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://cgit.freedesktop.org/accountsservice/commit/?id=26213aa0e0d8dca5f36cc23f6942525224cbe9f5"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://cgit.freedesktop.org/accountsservice/commit/?id=27f3d93a82fde4f6c7ab54f3f008af04f93f9c69"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://cgit.freedesktop.org/accountsservice/commit/?id=4c5b12e363410e490e776e4b4a86dcce157a543d"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://cgit.freedesktop.org/accountsservice/commit/?id=bd51aa4cdac380f55d607f4ffdf2ab3c00d08721"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083359.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/83398"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49695"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49759"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/06/28/9"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/54223"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-1485-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=832532"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76648"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://hermes.opensuse.org/messages/15100967"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://cgit.freedesktop.org/accountsservice/commit/?id=26213aa0e0d8dca5f36cc23f6942525224cbe9f5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cgit.freedesktop.org/accountsservice/commit/?id=27f3d93a82fde4f6c7ab54f3f008af04f93f9c69"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://cgit.freedesktop.org/accountsservice/commit/?id=4c5b12e363410e490e776e4b4a86dcce157a543d"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://cgit.freedesktop.org/accountsservice/commit/?id=bd51aa4cdac380f55d607f4ffdf2ab3c00d08721"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083359.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/83398"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49695"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49759"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/06/28/9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/54223"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1485-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=832532"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76648"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://hermes.opensuse.org/messages/15100967"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…