National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2009-4135 Detail

Description

The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.

Source:  MITRE      Last Modified:  12/11/2009

Quick Info

CVE Dictionary Entry:
CVE-2009-4135
Original release date:
12/11/2009
Last revised:
08/16/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
4.4 MEDIUM
Vector:
(AV:L/AC:M/Au:N/C:P/I:P/A:P) (legend)
Impact Subscore:
6.4
Exploitability Subscore:
3.4
CVSS Version 2 Metrics:
Access Vector:
Locally exploitable
Access Complexity:
Medium
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

Vendor Statements (disclaimer)

Official Statement from Red Hat (02/26/2010)

This issue does not affect users using coreutils binary RPMs, or rebuilding source RPMs. Therefore, we do not plan to release updates addressing this flaw on Red Hat Enterprise Linux 3, 4 and 5. For additional details, refer to the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-4135

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://git.savannah.gnu.org/cgit/coreutils.git/commit/?id=ae034822c535fa5 Issue Tracking; Patch External Source CONFIRM http://git.savannah.gnu.org/cgit/coreutils.git/commit/?id=ae034822c535fa5
http://marc.info/?l=oss-security&m=126030454503441&w=2 Mailing List; Patch; Third Party Advisory External Source MLIST [oss-security] 20091208 Re: CVE Request -- coreutils -- unsafe temporary directory location use
http://www.mail-archive.com/bug-coreutils@gnu.org/msg18779.html Mailing List; Patch External Source MLIST [bug-coreutils] 20091208 Re: build: distcheck: do not leave a $TMPDIR/coreutils directory behind
http://www.mail-archive.com/bug-coreutils@gnu.org/msg18787.html Mailing List; Patch External Source MLIST [bug-coreutils] 20091209 [PATCH] doc: NEWS: mention the "make distcheck" vulnerability
http://www.openwall.com/lists/oss-security/2009/12/08/4 Mailing List; Third Party Advisory External Source MLIST [oss-security] 20091208 CVE Request -- coreutils -- unsafe temporary directory location use
http://www.securityfocus.com/bid/37256 Third Party Advisory; VDB Entry External Source BID 37256
http://www.ubuntu.com/usn/USN-2473-1 Third Party Advisory External Source UBUNTU USN-2473-1
http://www.vupen.com/english/advisories/2009/3453 Permissions Required External Source VUPEN ADV-2009-3453
https://bugzilla.redhat.com/show_bug.cgi?id=545439 Issue Tracking; Patch External Source CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=545439
https://exchange.xforce.ibmcloud.com/vulnerabilities/54673 External Source XF gnu-core-distcheck-symlink(54673)
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00954.html Third Party Advisory External Source FEDORA FEDORA-2009-13216
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00972.html Third Party Advisory External Source FEDORA FEDORA-2009-13181

Technical Details

Vulnerability Type (View All)

Vulnerable software and versions Switch to CPE 2.2

Configuration 1
OR
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
Configuration 2
OR
cpe:2.3:a:gnu:coreutils:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:5.91:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:5.92:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:5.93:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:5.94:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:5.95:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:5.96:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:5.97:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:6.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:6.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:6.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:6.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:6.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:6.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:6.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:6.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:6.10:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:6.11:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:6.12:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:7.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:7.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:7.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:7.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:7.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:7.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:coreutils:8.1:*:*:*:*:*:*:*
Configuration 3
OR
cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History 5 change records found - show changes