Vulnerability Description
Insecure plugin update mechanism in tucan through 0.3.10 could allow remote attackers to perform man-in-the-middle attacks and execute arbitrary code ith the permissions of the user running tucan.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tucaneando | Tucan | <= 0.3.10 |
References
- http://www.openwall.com/lists/oss-security/2012/01/19/5Mailing ListThird Party Advisory
- https://access.redhat.com/security/cve/cve-2012-0063Broken LinkThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0063Issue TrackingThird Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2012-0063Third Party Advisory
- http://www.openwall.com/lists/oss-security/2012/01/19/5Mailing ListThird Party Advisory
- https://access.redhat.com/security/cve/cve-2012-0063Broken LinkThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0063Issue TrackingThird Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2012-0063Third Party Advisory
FAQ
What is CVE-2012-0063?
CVE-2012-0063 is a vulnerability with a CVSS score of 8.1 (HIGH). Insecure plugin update mechanism in tucan through 0.3.10 could allow remote attackers to perform man-in-the-middle attacks and execute arbitrary code ith the permissions of the user running tucan.
How severe is CVE-2012-0063?
CVE-2012-0063 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-0063?
Check the references section above for vendor advisories and patch information. Affected products include: Tucaneando Tucan.