CVE-2012-0871
Severity CVSS v4.0:
Pending analysis
Type:
CWE-59
Link Following
Publication date:
18/04/2014
Last modified:
12/04/2025
Description
The session_link_x11_socket function in login/logind-session.c in systemd-logind in systemd, possibly 37 and earlier, allows local users to create or overwrite arbitrary files via a symlink attack on the X11 user directory in /run/user/.
Impact
Base Score 2.0
6.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:* | 037 (including) | |
| cpe:2.3:a:systemd_project:systemd:1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:systemd_project:systemd:2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:systemd_project:systemd:3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:systemd_project:systemd:4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:systemd_project:systemd:5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:systemd_project:systemd:6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:systemd_project:systemd:7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:systemd_project:systemd:8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:systemd_project:systemd:9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:systemd_project:systemd:10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:systemd_project:systemd:11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:systemd_project:systemd:12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:systemd_project:systemd:13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:systemd_project:systemd:14:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://cgit.freedesktop.org/systemd/systemd/commit/?id=fc3c1c6e091ea16ad5600b145201ec535bbb5d7c
- http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00030.html
- http://www.osvdb.org/79768
- https://bugzilla.novell.com/show_bug.cgi?id=747154
- https://bugzilla.redhat.com/show_bug.cgi?id=795853
- http://cgit.freedesktop.org/systemd/systemd/commit/?id=fc3c1c6e091ea16ad5600b145201ec535bbb5d7c
- http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00030.html
- http://www.osvdb.org/79768
- https://bugzilla.novell.com/show_bug.cgi?id=747154
- https://bugzilla.redhat.com/show_bug.cgi?id=795853



