Vulnerability Description
gdm/guest-session-cleanup.sh in gdm-guest-session 0.24 and earlier, as used in Ubuntu Linux 10.04 LTS, 10.10, and 11.04, allows local users to delete arbitrary files via a space in the name of a file in /tmp. NOTE: this identifier was SPLIT from CVE-2012-0943 per ADT1/ADT2 due to different codebases and affected versions. CVE-2012-0943 is used for the guest-account issue.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gdm-Guest-Session Project | Gdm-Guest-Session | <= 0.24 |
| Canonical | Ubuntu Linux | 10.04 |
Related Weaknesses (CWE)
References
- http://ubuntu.com/usn/usn-1399-1PatchVendor Advisory
- https://bugs.launchpad.net/ubuntu/%2Bsource/lightdm/%2Bbug/953044
- https://launchpadlibrarian.net/96474113/gdm-guest-session.secure-cleanup.debdiff
- http://ubuntu.com/usn/usn-1399-1PatchVendor Advisory
- https://bugs.launchpad.net/ubuntu/%2Bsource/lightdm/%2Bbug/953044
- https://launchpadlibrarian.net/96474113/gdm-guest-session.secure-cleanup.debdiff
FAQ
What is CVE-2012-6648?
CVE-2012-6648 is a vulnerability with a CVSS score of 2.1 (LOW). gdm/guest-session-cleanup.sh in gdm-guest-session 0.24 and earlier, as used in Ubuntu Linux 10.04 LTS, 10.10, and 11.04, allows local users to delete arbitrary files via a space in the name of a file ...
How severe is CVE-2012-6648?
CVE-2012-6648 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-6648?
Check the references section above for vendor advisories and patch information. Affected products include: Gdm-Guest-Session Project Gdm-Guest-Session, Canonical Ubuntu Linux.