CVE-2010-2056
Gentoo Linux Security Advisory 201412-08
Severity Score
5.5
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
GNU gv before 3.7.0 allows local users to overwrite arbitrary files via a symlink attack on a temporary file.
GNU gv anterior a v3.7.0 permite a usuarios locales sobrescribir ficheros a su elección mediante un ataque de enlace simbólico en un archivo temporal.
This GLSA contains notification of vulnerabilities found in several Gentoo packages which have been fixed prior to January 1, 2011. The worst of these vulnerabilities could lead to local privilege escalation and remote code execution.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2010-05-25 CVE Reserved
- 2010-07-22 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-59: Improper Link Resolution Before File Access ('Link Following')
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://www.osvdb.org/66249 | Vdb Entry | |
https://bugzilla.redhat.com/show_bug.cgi?id=599621 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://savannah.gnu.org/forum/forum.php?forum_id=6368 | 2010-07-22 |
URL | Date | SRC |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043913.html | 2010-07-22 | |
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043948.html | 2010-07-22 | |
http://secunia.com/advisories/40475 | 2010-07-22 | |
http://secunia.com/advisories/40532 | 2010-07-22 | |
http://www.vupen.com/english/advisories/2010/1757 | 2010-07-22 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gnu Search vendor "Gnu" | Gv Search vendor "Gnu" for product "Gv" | <= 3.6.9 Search vendor "Gnu" for product "Gv" and version " <= 3.6.9" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Gv Search vendor "Gnu" for product "Gv" | 3.5.8 Search vendor "Gnu" for product "Gv" and version "3.5.8" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Gv Search vendor "Gnu" for product "Gv" | 3.6.0 Search vendor "Gnu" for product "Gv" and version "3.6.0" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Gv Search vendor "Gnu" for product "Gv" | 3.6.1 Search vendor "Gnu" for product "Gv" and version "3.6.1" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Gv Search vendor "Gnu" for product "Gv" | 3.6.2 Search vendor "Gnu" for product "Gv" and version "3.6.2" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Gv Search vendor "Gnu" for product "Gv" | 3.6.3 Search vendor "Gnu" for product "Gv" and version "3.6.3" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Gv Search vendor "Gnu" for product "Gv" | 3.6.4 Search vendor "Gnu" for product "Gv" and version "3.6.4" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Gv Search vendor "Gnu" for product "Gv" | 3.6.5 Search vendor "Gnu" for product "Gv" and version "3.6.5" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Gv Search vendor "Gnu" for product "Gv" | 3.6.6 Search vendor "Gnu" for product "Gv" and version "3.6.6" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Gv Search vendor "Gnu" for product "Gv" | 3.6.7 Search vendor "Gnu" for product "Gv" and version "3.6.7" | - |
Affected
| ||||||
Gnu Search vendor "Gnu" | Gv Search vendor "Gnu" for product "Gv" | 3.6.8 Search vendor "Gnu" for product "Gv" and version "3.6.8" | - |
Affected
|