// For flags

CVE-2012-0948

 

Severity Score

2.1
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

DistUpgrade/DistUpgradeMain.py in Update Manager, as used by Ubuntu 12.04 LTS, 11.10, and 11.04, uses weak permissions for (1) apt-clone_system_state.tar.gz and (2) system_state.tar.gz, which allows local users to obtain repository credentials.

DistUpgrade/DistUpgradeMain.py en el Administrador de actualización de Ubuntu v12.04 LTS, v11.10 y v11.04, utiliza permisos débiles para (1) system_state.tar.gz y (2) apt-clone_system_state.tar.gz, lo que permite a usuarios locales obtener las credenciales del repositorio.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2012-02-01 CVE Reserved
  • 2012-05-17 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Gnome
Search vendor "Gnome"
Update-manager-core
Search vendor "Gnome" for product "Update-manager-core"
0.150.5.2
Search vendor "Gnome" for product "Update-manager-core" and version "0.150.5.2"
-
Affected
Gnome
Search vendor "Gnome"
Update-manager-core
Search vendor "Gnome" for product "Update-manager-core"
0.152.25.10
Search vendor "Gnome" for product "Update-manager-core" and version "0.152.25.10"
-
Affected
Gnome
Search vendor "Gnome"
Update-manager-core
Search vendor "Gnome" for product "Update-manager-core"
0.156.14.3
Search vendor "Gnome" for product "Update-manager-core" and version "0.156.14.3"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
11.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "11.04"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
11.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "11.10"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
12.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04"
lts
Affected