CVE-2012-4430
Gentoo Linux Security Advisory 201405-11
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The dump_resource function in dird/dird_conf.c in Bacula before 5.2.11 does not properly enforce ACL rules, which allows remote authenticated users to obtain resource dump information via unspecified vectors.
La función dump_resource de dird/dird_conf.c en Bacula anteriores a v5.2.11 no hace cumplir correctamente las reglas ACL, permitiendo a usuarior remotos autenticados obtener volcados de la información de recursos mediante vectores no especificados.
The dump_resource function in dird/dird_conf.c in Bacula before 5.2.11 does not properly enforce ACL rules, which allows remote authenticated users to obtain resource dump information via unspecified vectors. The updated packages have been patched to correct this issue.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-08-21 CVE Reserved
- 2012-10-08 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/50535 | Third Party Advisory | |
http://secunia.com/advisories/50808 | Third Party Advisory | |
http://sourceforge.net/projects/bacula/files/bacula/5.2.12/ReleaseNotes/view | Third Party Advisory | |
http://www.openwall.com/lists/oss-security/2012/09/14/11 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2012/09/14/12 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2012/09/15/2 | Mailing List |
|
http://www.securityfocus.com/bid/55505 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.bacula.org/git/cgit.cgi/bacula/commit/?id=67debcecd3d530c429e817e1d778e79dcd1db905 | 2018-10-09 |
URL | Date | SRC |
---|---|---|
http://www.bacula.org/en/?page=news | 2018-10-09 | |
http://www.debian.org/security/2012/dsa-2558 | 2018-10-09 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2012:166 | 2018-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Bacula Search vendor "Bacula" | Bacula Search vendor "Bacula" for product "Bacula" | < 5.2.11 Search vendor "Bacula" for product "Bacula" and version " < 5.2.11" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 6.0 Search vendor "Debian" for product "Debian Linux" and version "6.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
|