Уязвимость CVE-2012-2737: Информация

Описание

The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.

Важность: LOW (1,9)

Опубликовано: 22 июля 2012 г.
Изменено: 29 августа 2017 г.
Идентификатор типа ошибки: CWE-362

Ссылки на рекомендации, решения и инструменты

    1. Конфигурация 1

      cpe:2.3:a:ray_stode:accountsservice:0.6.6:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:*:*:*:*:*:*:*:*
      End including
      0.6.21

      cpe:2.3:a:ray_stode:accountsservice:0.6.7:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.6.8:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.5:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.6.13:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.6.16:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.6.20:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.6.14:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.6.15:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.6.4:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.6.19:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.6.5:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.6.17:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.4:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.6.1:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.6:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.6.10:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.6.9:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.6.3:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.6.12:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.6.18:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.6.2:*:*:*:*:*:*:*

      cpe:2.3:a:ray_stode:accountsservice:0.6.11:*:*:*:*:*:*:*