4.4
CVSSv2

CVE-2009-3289

Published: 22/09/2009 Updated: 08/02/2024
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 392
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.

Vulnerable Product Search on Vulmon Subscribe to Product

gnome glib 2.0

opensuse opensuse 11.1

opensuse opensuse 11.0

suse suse linux enterprise server 11

Vendor Advisories

Arand Nash discovered that applications linked to GLib (eg Nautilus) did not correctly copy symlinks If a user copied symlinks with GLib, the symlink target files would become world-writable, allowing local attackers to gain access to potentially sensitive information ...