foo2zjs on Debian/Ubuntu Temp File /tmp/foo2zjs Symlink link following
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.2 | $0-$5k | 0.00 |
Summary
A vulnerability has been found in foo2zjs on Debian/Ubuntu and classified as problematic. This affects an unknown function of the file /tmp/foo2zjs of the component Temp File Handler. The manipulation as part of Symlink leads to link following. This vulnerability is referenced as CVE-2011-2684. The attack can only be performed from a local environment. No exploit is available. The affected component should be upgraded.
Details
A vulnerability was found in foo2zjs on Debian/Ubuntu and classified as problematic. This issue affects an unknown part of the file /tmp/foo2zjs of the component Temp File Handler. The manipulation as part of a Symlink leads to a link following vulnerability. Using CWE to declare the problem leads to CWE-59. The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource. Impacted is confidentiality, integrity, and availability. The summary by CVE is:
foo2zjs before 20110722dfsg-3ubuntu1 as packaged in Ubuntu, 20110722dfsg-1 as packaged in Debian unstable, and 20090908dfsg-5.1+squeeze0 as packaged in Debian squeeze create temporary files insecurely, which allows local users to write over arbitrary files via a symlink attack on /tmp/foo2zjs.
The bug was discovered 07/11/2011. The weakness was published 10/23/2017 (oss-sec). The advisory is shared at openwall.com. The identification of this vulnerability is CVE-2011-2684 since 07/11/2011. An attack has to be approached locally. A simple authentication is necessary for exploitation. Technical details are known, but no exploit is available.
The vulnerability was handled as a non-public zero-day exploit for at least 2296 days. During that time the estimated underground price was around $0-$5k.
Upgrading to version 20090908dfsg-5.1+squeeze0, 20110722dfsg-1 or 20110722dfsg-3ubuntu1 eliminates this vulnerability.
Similar entries are available at VDB-108315, VDB-108316, VDB-108544 and VDB-112647. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Name
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.4VulDB Meta Temp Score: 5.3
VulDB Base Score: 5.3
VulDB Temp Score: 5.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 5.5
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Link followingCWE: CWE-59
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: foo2zjs 20090908dfsg-5.1+squeeze0/20110722dfsg-1/20110722dfsg-3ubuntu1
Timeline
07/11/2011 🔍07/11/2011 🔍
10/23/2017 🔍
10/23/2017 🔍
10/24/2017 🔍
11/30/2019 🔍
Sources
Advisory: openwall.comStatus: Not defined
CVE: CVE-2011-2684 (🔍)
GCVE (CVE): GCVE-0-2011-2684
GCVE (VulDB): GCVE-100-108545
See also: 🔍
Entry
Created: 10/24/2017 10:09Updated: 11/30/2019 09:02
Changes: 10/24/2017 10:09 (60), 11/30/2019 09:02 (1)
Complete: 🔍
Cache ID: 216:54D:103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.