Vulnerability Description
Anaconda 3 2023.03-1-Linux allows local users to disrupt TLS certificate validation by modifying the cacert.pem file used by the installed pip program. This occurs because many files are installed as world-writable on Linux, ignoring umask, even when these files are installed as root. Miniconda is also affected.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Anaconda | Anaconda3 | 2023.03-1 |
| Linux | Linux Kernel | - |
Related Weaknesses (CWE)
References
- https://uponfurtherinvestigation.blogspot.com/2023/06/cve-2023-35845-anaconda3-cExploit
- https://uponfurtherinvestigation.blogspot.com/2023/06/cve-2023-35845-anaconda3-cExploit
FAQ
What is CVE-2023-35845?
CVE-2023-35845 is a vulnerability with a CVSS score of 4.7 (MEDIUM). Anaconda 3 2023.03-1-Linux allows local users to disrupt TLS certificate validation by modifying the cacert.pem file used by the installed pip program. This occurs because many files are installed as ...
How severe is CVE-2023-35845?
CVE-2023-35845 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-35845?
Check the references section above for vendor advisories and patch information. Affected products include: Anaconda Anaconda3, Linux Linux Kernel.