ID CVE-2012-3378
Summary The register_application function in atk-adaptor/bridge.c in GNOME at-spi2-atk 2.5.2 does not seed the random number generator and generates predictable temporary file names, which makes it easier for local users to create or truncate files via a symlink attack on a temporary socket file in /tmp/at-spi2.
References
Vulnerable Configurations
  • cpe:2.3:a:gnome:at-spi2-atk:2.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnome:at-spi2-atk:2.5.2:*:*:*:*:*:*:*
CVSS
Base: 3.3 (as of 05-09-2012 - 04:00)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
LOCAL MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL PARTIAL
cvss-vector via4 AV:L/AC:M/Au:N/C:N/I:P/A:P
refmap via4
confirm https://bugzilla.gnome.org/show_bug.cgi?id=678348
misc http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678026
mlist
  • [oss-security] 20120705 Three CVE requests: at-spi2-atk, as31, naxsi
  • [oss-security] 20120706 Re: Three CVE requests: at-spi2-atk, as31, naxsi
Last major update 05-09-2012 - 04:00
Published 31-08-2012 - 18:55
Last modified 05-09-2012 - 04:00
Back to Top