Vulnerability Description
In tesseract 2.03 and 2.04, an attacker can rewrite an arbitrary user file by guessing the PID and creating a link to the user's file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tesseract Project | Tesseract | 2.03 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=612032ExploitMailing ListPatch
- https://bugs.launchpad.net/ubuntu/+source/tesseract/+bug/607297ExploitIssue TrackingThird Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2011-1136Third Party Advisory
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=612032ExploitMailing ListPatch
- https://bugs.launchpad.net/ubuntu/+source/tesseract/+bug/607297ExploitIssue TrackingThird Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2011-1136Third Party Advisory
FAQ
What is CVE-2011-1136?
CVE-2011-1136 is a vulnerability with a CVSS score of 4.7 (MEDIUM). In tesseract 2.03 and 2.04, an attacker can rewrite an arbitrary user file by guessing the PID and creating a link to the user's file.
How severe is CVE-2011-1136?
CVE-2011-1136 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-1136?
Check the references section above for vendor advisories and patch information. Affected products include: Tesseract Project Tesseract, Debian Debian Linux.