LOW · 3.3

CVE-2012-3378

The register_application function in atk-adaptor/bridge.c in GNOME at-spi2-atk 2.5.2 does not seed the random number generator and generates predictable temporary file names, which makes it easier for...

Vulnerability Description

The register_application function in atk-adaptor/bridge.c in GNOME at-spi2-atk 2.5.2 does not seed the random number generator and generates predictable temporary file names, which makes it easier for local users to create or truncate files via a symlink attack on a temporary socket file in /tmp/at-spi2.

CVSS Score

3.3

LOW

AV:L/AC:M/Au:N/C:N/I:P/A:P
Confidentiality
NONE
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
GnomeAt-Spi2-Atk2.5.2

Related Weaknesses (CWE)

References

FAQ

What is CVE-2012-3378?

CVE-2012-3378 is a vulnerability with a CVSS score of 3.3 (LOW). The register_application function in atk-adaptor/bridge.c in GNOME at-spi2-atk 2.5.2 does not seed the random number generator and generates predictable temporary file names, which makes it easier for...

How severe is CVE-2012-3378?

CVE-2012-3378 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2012-3378?

Check the references section above for vendor advisories and patch information. Affected products include: Gnome At-Spi2-Atk.