| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.6 | $0-$5k | 0.00 |
Summary
A vulnerability classified as problematic has been found in Amarok 1.4.9.1. This issue affects the function MagnatuneBrowser::listDownloadComplete. Performing a manipulation results in link following.
This vulnerability is reported as CVE-2008-3699. No exploit exists.
It is recommended to upgrade the affected component.
Details
A vulnerability, which was classified as problematic, was found in Amarok 1.4.9.1. This affects the function MagnatuneBrowser::listDownloadComplete. The manipulation with an unknown input leads to a link following vulnerability. CWE is classifying the issue as CWE-59. The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource. This is going to have an impact on integrity, and availability. The summary by CVE is:
The MagnatuneBrowser::listDownloadComplete function in magnatunebrowser/magnatunebrowser.cpp in Amarok before 1.4.10 allows local users to overwrite arbitrary files via a symlink attack on the album_info.xml temporary file.
The bug was discovered 08/12/2008. The weakness was disclosed 08/14/2008 (Website). It is possible to read the advisory at redhat.com. This vulnerability is uniquely identified as CVE-2008-3699 since 08/14/2008. Attacking locally is a requirement. No form of authentication is needed for exploitation. Technical details of the vulnerability are known, but there is no available exploit.
It is declared as proof-of-concept. The vulnerability was handled as a non-public zero-day exploit for at least 2 days. During that time the estimated underground price was around $0-$5k. The vulnerability scanner Nessus provides a plugin with the ID 34115 (GLSA-200809-08 : Amarok: Insecure temporary file creation), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Gentoo Local Security Checks and running in the context l.
Upgrading to version 1.4.9.1 eliminates this vulnerability. A possible mitigation has been published 4 weeks after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (44399), Tenable (34115), SecurityFocus (BID 30662†), OSVDB (47455†) and Secunia (SA31418†). Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.1VulDB Meta Temp Score: 4.6
VulDB Base Score: 5.1
VulDB Temp Score: 4.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Link followingCWE: CWE-59
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 34115
Nessus Name: GLSA-200809-08 : Amarok: Insecure temporary file creation
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Nessus Port: 🔍
OpenVAS ID: 61605
OpenVAS Name: Slackware Advisory SSA:2008-241-01 amarok
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: Amarok 1.4.9.1
Timeline
08/12/2008 🔍08/12/2008 🔍
08/12/2008 🔍
08/12/2008 🔍
08/14/2008 🔍
08/14/2008 🔍
08/14/2008 🔍
09/01/2008 🔍
09/08/2008 🔍
09/09/2008 🔍
03/17/2015 🔍
08/16/2019 🔍
Sources
Advisory: redhat.comStatus: Not defined
Confirmation: 🔍
CVE: CVE-2008-3699 (🔍)
GCVE (CVE): GCVE-0-2008-3699
GCVE (VulDB): GCVE-100-43707
OVAL: 🔍
X-Force: 44399
SecurityFocus: 30662 - Amarok 'MagnatuneBrowser::listDownloadComplete()' Insecure Temporary File Creation Vulnerability
Secunia: 31418 - Amarok "MagnatuneBrowser::listDownloadComplete()" Insecure Temporary Files, Less Critical
OSVDB: 47455 - Amarok MagnatuneBrowser::listDownloadComplete() function symlink
Vulnerability Center: 19345 - Amarok < 1.4.10 Magnatune Music Library Allows Local Overwriting of Files via a Symlink Attack, Low
Vupen: ADV-2008-2338
Entry
Created: 03/17/2015 12:19Updated: 08/16/2019 10:06
Changes: 03/17/2015 12:19 (80), 08/16/2019 10:06 (4)
Complete: 🔍
Cache ID: 216:164:103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.