Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2012-2737 |
CWE-ID | CWE-362 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
accountsservice Other software / Other software solutions |
Vendor | Freedesktop.org |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU43801
Risk: Low
CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2012-2737
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.
MitigationInstall update from vendor's website.
Vulnerable software versionsaccountsservice: 0.4 - 0.6.20
CPE2.3http://cgit.freedesktop.org/accountsservice/commit/?id=26213aa0e0d8dca5f36cc23f6942525224cbe9f5
http://cgit.freedesktop.org/accountsservice/commit/?id=27f3d93a82fde4f6c7ab54f3f008af04f93f9c69
http://cgit.freedesktop.org/accountsservice/commit/?id=4c5b12e363410e490e776e4b4a86dcce157a543d
http://cgit.freedesktop.org/accountsservice/commit/?id=bd51aa4cdac380f55d607f4ffdf2ab3c00d08721
http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083359.html
http://osvdb.org/83398
http://secunia.com/advisories/49695
http://secunia.com/advisories/49759
http://www.openwall.com/lists/oss-security/2012/06/28/9
http://www.securityfocus.com/bid/54223
http://www.ubuntu.com/usn/USN-1485-1
http://bugzilla.redhat.com/show_bug.cgi?id=832532
http://exchange.xforce.ibmcloud.com/vulnerabilities/76648
http://hermes.opensuse.org/messages/15100967
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.