The init script in the Debian x11-common package before 1:7.6+12 is vulnerable to a symlink attack that can lead to a privilege escalation during package installation.
References
Link | Resource |
---|---|
http://vladz.devzero.fr/012_x11-common-vuln.html | Exploit Third Party Advisory |
http://www.openwall.com/lists/oss-security/2012/03/01/1 | Mailing List Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2012-1093 | Vendor Advisory |
https://access.redhat.com/security/cve/cve-2012-1093 | Broken Link |
http://www.openwall.com/lists/oss-security/2012/02/29/1 | Exploit Mailing List Third Party Advisory |
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-02-21 11:15
Updated : 2021-02-25 09:15
NVD link : CVE-2012-1093
Mitre link : CVE-2012-1093
JSON object : View
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
Products Affected
debian
- x11-common
- debian_linux