Race condition in Freedesktop accountsservice



| Updated: 2020-08-11
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2012-2737
CWE-ID CWE-362
Exploitation vector Network
Public exploit N/A
Vulnerable software
accountsservice
Other software / Other software solutions

Vendor Freedesktop.org

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Race condition

EUVDB-ID: #VU43801

Risk: Low

CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2012-2737

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.

Mitigation

Install update from vendor's website.

Vulnerable software versions

accountsservice: 0.4 - 0.6.20

CPE2.3 External links

http://cgit.freedesktop.org/accountsservice/commit/?id=26213aa0e0d8dca5f36cc23f6942525224cbe9f5
http://cgit.freedesktop.org/accountsservice/commit/?id=27f3d93a82fde4f6c7ab54f3f008af04f93f9c69
http://cgit.freedesktop.org/accountsservice/commit/?id=4c5b12e363410e490e776e4b4a86dcce157a543d
http://cgit.freedesktop.org/accountsservice/commit/?id=bd51aa4cdac380f55d607f4ffdf2ab3c00d08721
http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083359.html
http://osvdb.org/83398
http://secunia.com/advisories/49695
http://secunia.com/advisories/49759
http://www.openwall.com/lists/oss-security/2012/06/28/9
http://www.securityfocus.com/bid/54223
http://www.ubuntu.com/usn/USN-1485-1
http://bugzilla.redhat.com/show_bug.cgi?id=832532
http://exchange.xforce.ibmcloud.com/vulnerabilities/76648
http://hermes.opensuse.org/messages/15100967


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###