CVE-2011-0727
Severity CVSS v4.0:
Pending analysis
Type:
CWE-59
Link Following
Publication date:
31/03/2011
Last modified:
11/04/2025
Description
GNOME Display Manager (gdm) 2.x before 2.32.1 allows local users to change the ownership of arbitrary files via a symlink attack on a (1) dmrc or (2) face icon file under /var/cache/gdm/.
Impact
Base Score 2.0
6.90
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gnome:gdm:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.15:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.16:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.17:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.18:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.19:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.20:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://ftp.gnome.org/pub/GNOME/sources/gdm/2.32/gdm-2.32.1.news
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057333.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057931.html
- http://mail.gnome.org/archives/gdm-list/2011-March/msg00020.html
- http://secunia.com/advisories/43714
- http://secunia.com/advisories/43854
- http://secunia.com/advisories/44021
- http://securitytracker.com/id?1025264=
- http://www.debian.org/security/2011/dsa-2205
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A070
- http://www.redhat.com/support/errata/RHSA-2011-0395.html
- http://www.securityfocus.com/bid/47063
- http://www.ubuntu.com/usn/USN-1099-1
- http://www.vupen.com/english/advisories/2011/0786
- http://www.vupen.com/english/advisories/2011/0787
- http://www.vupen.com/english/advisories/2011/0797
- http://www.vupen.com/english/advisories/2011/0847
- http://www.vupen.com/english/advisories/2011/0911
- https://bugzilla.redhat.com/show_bug.cgi?id=688323
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66377
- http://ftp.gnome.org/pub/GNOME/sources/gdm/2.32/gdm-2.32.1.news
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057333.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057931.html
- http://mail.gnome.org/archives/gdm-list/2011-March/msg00020.html
- http://secunia.com/advisories/43714
- http://secunia.com/advisories/43854
- http://secunia.com/advisories/44021
- http://securitytracker.com/id?1025264=
- http://www.debian.org/security/2011/dsa-2205
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A070
- http://www.redhat.com/support/errata/RHSA-2011-0395.html
- http://www.securityfocus.com/bid/47063
- http://www.ubuntu.com/usn/USN-1099-1
- http://www.vupen.com/english/advisories/2011/0786
- http://www.vupen.com/english/advisories/2011/0787
- http://www.vupen.com/english/advisories/2011/0797
- http://www.vupen.com/english/advisories/2011/0847
- http://www.vupen.com/english/advisories/2011/0911
- https://bugzilla.redhat.com/show_bug.cgi?id=688323
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66377



