CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2012-2737

The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.
Publish Date : 2012-07-22 Last Update Date : 2017-08-29
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
1.9
Confidentiality Impact Partial (There is considerable informational disclosure.)
Integrity Impact None (There is no impact to the integrity of the system)
Availability Impact None (There is no impact to the availability of the system.)
Access Complexity Medium (The access conditions are somewhat specialized. Some preconditions must be satistified to exploit)
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access None
Vulnerability Type(s)
CWE ID 362

- Products Affected By CVE-2012-2737

# Product Type Vendor Product Version Update Edition Language
1 Application Ray Stode Accountsservice * * * * Version Details Vulnerabilities
2 Application Ray Stode Accountsservice 0.4 * * * Version Details Vulnerabilities
3 Application Ray Stode Accountsservice 0.5 * * * Version Details Vulnerabilities
4 Application Ray Stode Accountsservice 0.6 * * * Version Details Vulnerabilities
5 Application Ray Stode Accountsservice 0.6.1 * * * Version Details Vulnerabilities
6 Application Ray Stode Accountsservice 0.6.2 * * * Version Details Vulnerabilities
7 Application Ray Stode Accountsservice 0.6.3 * * * Version Details Vulnerabilities
8 Application Ray Stode Accountsservice 0.6.4 * * * Version Details Vulnerabilities
9 Application Ray Stode Accountsservice 0.6.5 * * * Version Details Vulnerabilities
10 Application Ray Stode Accountsservice 0.6.6 * * * Version Details Vulnerabilities
11 Application Ray Stode Accountsservice 0.6.7 * * * Version Details Vulnerabilities
12 Application Ray Stode Accountsservice 0.6.8 * * * Version Details Vulnerabilities
13 Application Ray Stode Accountsservice 0.6.9 * * * Version Details Vulnerabilities
14 Application Ray Stode Accountsservice 0.6.10 * * * Version Details Vulnerabilities
15 Application Ray Stode Accountsservice 0.6.11 * * * Version Details Vulnerabilities
16 Application Ray Stode Accountsservice 0.6.12 * * * Version Details Vulnerabilities
17 Application Ray Stode Accountsservice 0.6.13 * * * Version Details Vulnerabilities
18 Application Ray Stode Accountsservice 0.6.14 * * * Version Details Vulnerabilities
19 Application Ray Stode Accountsservice 0.6.15 * * * Version Details Vulnerabilities
20 Application Ray Stode Accountsservice 0.6.16 * * * Version Details Vulnerabilities
21 Application Ray Stode Accountsservice 0.6.17 * * * Version Details Vulnerabilities
22 Application Ray Stode Accountsservice 0.6.18 * * * Version Details Vulnerabilities
23 Application Ray Stode Accountsservice 0.6.19 * * * Version Details Vulnerabilities
24 Application Ray Stode Accountsservice 0.6.20 * * * Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
Ray Stode Accountsservice 24

- References For CVE-2012-2737

http://www.ubuntu.com/usn/USN-1485-1
UBUNTU USN-1485-1
http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083359.html
FEDORA FEDORA-2012-10120
https://bugzilla.redhat.com/show_bug.cgi?id=832532
http://cgit.freedesktop.org/accountsservice/commit/?id=bd51aa4cdac380f55d607f4ffdf2ab3c00d08721 CONFIRM
http://www.securityfocus.com/bid/54223
BID 54223 AccountsService 'user_change_icon_file_authorized_cb()' Function File Disclosure Vulnerability Release Date:2013-04-09
http://secunia.com/advisories/49759
SECUNIA 49759
https://hermes.opensuse.org/messages/15100967
SUSE openSUSE-SU-2012:0845
http://secunia.com/advisories/49695
SECUNIA 49695
http://cgit.freedesktop.org/accountsservice/commit/?id=27f3d93a82fde4f6c7ab54f3f008af04f93f9c69 CONFIRM
http://cgit.freedesktop.org/accountsservice/commit/?id=26213aa0e0d8dca5f36cc23f6942525224cbe9f5 CONFIRM
http://www.openwall.com/lists/oss-security/2012/06/28/9
MLIST [oss-security] 20120628 accountsservice local file disclosure flaw (CVE-2012-2737)
http://osvdb.org/83398
OSVDB 83398
http://cgit.freedesktop.org/accountsservice/commit/?id=4c5b12e363410e490e776e4b4a86dcce157a543d CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/76648
XF accountsservice-userchangeicon-info-disc(76648)

- Metasploit Modules Related To CVE-2012-2737

There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information)


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.