Permissions, Privileges, and Access Controls in gvfs - CVE-2019-12449

 

Permissions, Privileges, and Access Controls in gvfs - CVE-2019-12449

Published: June 5, 2019 / Updated: June 13, 2019


Vulnerability identifier: #VU18676
CSH Severity: Critical
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Red
CVE-ID: CVE-2019-12449
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Gnome Development Team
Affected software:
gvfs

Detailed vulnerability description

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to mishandling of file user and group ownership in the daemon/gvfsbackendadmin.c file. Operations "G_FILE_COPY_ALL_METADATA" from admin:// URIs to file:// URIs during move-and-copy are handled by the Gnome Input/Output (GIO) fallback code, which does not run with root permissions. A remote attacker can gain unauthorized access to arbitrary file information on a system.


How to mitigate CVE-2019-12449

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

As a temporary solution we recommend to install the software updates at the following link:


Sources