LOW · 3.6

CVE-2013-0164

The lockwrap function in port-proxy/bin/openshift-port-proxy-cfg in Red Hat OpenShift Origin before 1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a ...

Vulnerability Description

The lockwrap function in port-proxy/bin/openshift-port-proxy-cfg in Red Hat OpenShift Origin before 1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.

CVSS Score

3.6

LOW

AV:L/AC:L/Au:N/C:N/I:P/A:P
Confidentiality
NONE
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
RedhatOpenshift<= 1.0
RedhatOpenshift Origin1.0.5

Related Weaknesses (CWE)

References

FAQ

What is CVE-2013-0164?

CVE-2013-0164 is a vulnerability with a CVSS score of 3.6 (LOW). The lockwrap function in port-proxy/bin/openshift-port-proxy-cfg in Red Hat OpenShift Origin before 1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a ...

How severe is CVE-2013-0164?

CVE-2013-0164 has been rated LOW with a CVSS base score of 3.6/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2013-0164?

Check the references section above for vendor advisories and patch information. Affected products include: Redhat Openshift, Redhat Openshift Origin.