2 results (0.013 seconds)

CVSS: 6.4EPSS: 0%CPEs: 10EXPL: 0

DistUpgrade/DistUpgradeFetcherCore.py in Update Manager before 1:0.87.31.1, 1:0.134.x before 1:0.134.11.1, 1:0.142.x before 1:0.142.23.1, 1:0.150.x before 1:0.150.5.1, and 1:0.152.x before 1:0.152.25.5 on Ubuntu 8.04 through 11.10 does not verify the GPG signature before extracting an upgrade tarball, which allows man-in-the-middle attackers to (1) create or overwrite arbitrary files via a directory traversal attack using a crafted tar file, or (2) bypass authentication via a crafted meta-release file. DistUpgrade/DistUpgradeFetcherCore.py en Update Manager anterior a 1:0.87.31.1, 1:0.134.x anterior a 1:0.134.11.1, 1:0.142.x anterior a 1:0.142.23.1, 1:0.150.x anterior a 1:0.150.5.1 y 1:0.152.x anterior a 1:0.152.25.5 en Ubuntu 8.04 hasta 11.10 no verifica la firma GPG antes de extraer un tarball actualizazción, lo que permite a atacantes man-the-middle (1) crear o sobrescribir archivos arbitrarios a través de un ataque de salto de directorio mediante el uso de un archivo TAR manipulado o (2) evadir autenticación a través de un archivo meta-release manipulado. • http://secunia.com/advisories/47024 http://www.osvdb.org/77642 http://www.securityfocus.com/bid/50833 http://www.ubuntu.com/usn/USN-1284-1 https://bugs.launchpad.net/ubuntu/%2Bsource/update-manager/%2Bbug/881548 https://exchange.xforce.ibmcloud.com/vulnerabilities/71494 • CWE-310: Cryptographic Issues •

CVSS: 1.9EPSS: 0%CPEs: 10EXPL: 0

DistUpgrade/DistUpgradeViewKDE.py in Update Manager before 1:0.87.31.1, 1:0.134.x before 1:0.134.11.1, 1:0.142.x before 1:0.142.23.1, 1:0.150.x before 1:0.150.5.1, and 1:0.152.x before 1:0.152.25.5 does not properly create temporary files, which allows local users to obtain the XAUTHORITY file content for a user via a symlink attack on the temporary file. DistUpgrade/DistUpgradeViewKDE.py en Update Manager anterior a 1:0.87.31.1, 1:0.134.x anterior a 1:0.134.11.1, 1:0.142.x anterior a 1:0.142.23.1, 1:0.150.x anterior a 1:0.150.5.1 y 1:0.152.x anterior a 1:0.152.25.5 no crea debidamente archivos temporales, lo que permite a usuarios locales obtener el contenido de archivo XAUTHORITY para un usuario a través de un ataque symlink sobre el archivo temporal. • http://secunia.com/advisories/47024 http://www.ubuntu.com/usn/USN-1284-1 https://bugs.launchpad.net/ubuntu/+source/update-manager/+bug/881541 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •