Permissions, Privileges, and Access Controls in Automake - CVE-2012-3386
Published: August 8, 2012 / Updated: July 28, 2020
Automake
GNU
Description
The vulnerability allows a local non-authenticated attacker to read and manipulate data.
The "make distcheck" rule in GNU Automake before 1.11.6 and 1.12.x before 1.12.2 grants world-writable permissions to the extraction directory, which introduces a race condition that allows local users to execute arbitrary code via unspecified vectors.
Remediation
External links
- http://git.savannah.gnu.org/cgit/automake.git/commit/?id=784b3e6ccc7c72a1c95c340cbbe8897d6b689d76
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089187.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-September/087538.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-September/087665.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00038.html
- http://rhn.redhat.com/errata/RHSA-2013-0526.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:103
- https://lists.gnu.org/archive/html/automake/2012-07/msg00021.html
- https://lists.gnu.org/archive/html/automake/2012-07/msg00022.html
- https://lists.gnu.org/archive/html/automake/2012-07/msg00023.html