Vulnerability Description
src/common/latex.py in Gajim 0.15 allows local users to overwrite arbitrary files via a symlink attack on a temporary latex file, related to the get_tmpfile_name function.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gajim | Gajim | 0.15 |
Related Weaknesses (CWE)
References
- http://hg.gajim.org/gajim/rev/f046e4aaf7d4
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079169.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079237.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079241.html
- http://secunia.com/advisories/48695Vendor Advisory
- http://secunia.com/advisories/48794
- http://security.gentoo.org/glsa/glsa-201208-04.xml
- http://www.openwall.com/lists/oss-security/2012/04/10/15
- http://www.openwall.com/lists/oss-security/2012/04/10/6
- http://www.securityfocus.com/bid/53017
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74869
- https://trac.gajim.org/changeset/13759/src/common/latex.py
- http://hg.gajim.org/gajim/rev/f046e4aaf7d4
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079169.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079237.html
FAQ
What is CVE-2012-2093?
CVE-2012-2093 is a vulnerability with a CVSS score of 3.3 (LOW). src/common/latex.py in Gajim 0.15 allows local users to overwrite arbitrary files via a symlink attack on a temporary latex file, related to the get_tmpfile_name function.
How severe is CVE-2012-2093?
CVE-2012-2093 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-2093?
Check the references section above for vendor advisories and patch information. Affected products include: Gajim Gajim.