Vulnerability Description
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opensuse | Opensuse | 13.1 |
| Jython Project | Jython | 2.2.1 |
Related Weaknesses (CWE)
References
- http://advisories.mageia.org/MGASA-2015-0096.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00055.htmlThird Party Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:158Broken Link
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- https://bugzilla.redhat.com/show_bug.cgi?id=947949Issue Tracking
- http://advisories.mageia.org/MGASA-2015-0096.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00055.htmlThird Party Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:158Broken Link
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- https://bugzilla.redhat.com/show_bug.cgi?id=947949Issue Tracking
FAQ
What is CVE-2013-2027?
CVE-2013-2027 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
How severe is CVE-2013-2027?
CVE-2013-2027 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-2027?
Check the references section above for vendor advisories and patch information. Affected products include: Opensuse Opensuse, Jython Project Jython.