Vulnerabilidad en GNOME Display Manager (CVE-2011-0727)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-59
Incorrecta resolución de una ruta antes de aceder a un fichero (Seguimiento de enlaces)
Fecha de publicación:
31/03/2011
Última modificación:
11/04/2025
Descripción
GNOME Display Manager (GDM) v2.x anterior a v2.32.1 permite a usuarios locales cambiar el propietario de archivos arbitrarios mediante un ataque de enlace simbólico en un (1) DMRC o (2) fichero de icono en /var/cache/gdm/.
Impacto
Puntuación base 2.0
6.90
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:gnome:gdm:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.15:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.16:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.17:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.18:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.19:*:*:*:*:*:*:* | ||
| cpe:2.3:a:gnome:gdm:2.20:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://ftp.gnome.org/pub/GNOME/sources/gdm/2.32/gdm-2.32.1.news
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057333.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057931.html
- http://mail.gnome.org/archives/gdm-list/2011-March/msg00020.html
- http://secunia.com/advisories/43714
- http://secunia.com/advisories/43854
- http://secunia.com/advisories/44021
- http://securitytracker.com/id?1025264=
- http://www.debian.org/security/2011/dsa-2205
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A070
- http://www.redhat.com/support/errata/RHSA-2011-0395.html
- http://www.securityfocus.com/bid/47063
- http://www.ubuntu.com/usn/USN-1099-1
- http://www.vupen.com/english/advisories/2011/0786
- http://www.vupen.com/english/advisories/2011/0787
- http://www.vupen.com/english/advisories/2011/0797
- http://www.vupen.com/english/advisories/2011/0847
- http://www.vupen.com/english/advisories/2011/0911
- https://bugzilla.redhat.com/show_bug.cgi?id=688323
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66377
- http://ftp.gnome.org/pub/GNOME/sources/gdm/2.32/gdm-2.32.1.news
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057333.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057931.html
- http://mail.gnome.org/archives/gdm-list/2011-March/msg00020.html
- http://secunia.com/advisories/43714
- http://secunia.com/advisories/43854
- http://secunia.com/advisories/44021
- http://securitytracker.com/id?1025264=
- http://www.debian.org/security/2011/dsa-2205
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A070
- http://www.redhat.com/support/errata/RHSA-2011-0395.html
- http://www.securityfocus.com/bid/47063
- http://www.ubuntu.com/usn/USN-1099-1
- http://www.vupen.com/english/advisories/2011/0786
- http://www.vupen.com/english/advisories/2011/0787
- http://www.vupen.com/english/advisories/2011/0797
- http://www.vupen.com/english/advisories/2011/0847
- http://www.vupen.com/english/advisories/2011/0911
- https://bugzilla.redhat.com/show_bug.cgi?id=688323
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66377



