CVE-2009-5081
Vulnerability from cvelistv5
Published
2011-06-30 15:26
Modified
2024-08-07 07:24
Severity ?
EPSS score ?
Summary
The (1) config.guess, (2) contrib/groffer/perl/groffer.pl, and (3) contrib/groffer/perl/roff2.pl scripts in GNU troff (aka groff) 1.21 and earlier use an insufficient number of X characters in the template argument to the tempfile function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file, a different vulnerability than CVE-2004-0969.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:24:54.079Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20090814 Re: CVE id request: groff (pdfroff)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2009/08/14/4" }, { "name": "[oss-security] 20090814 Re: CVE id request: groff (pdfroff)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2009/08/14/5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff.diff?r1=1.1%3Br2=1.2%3Bf=h" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff" }, { "name": "MDVSA-2013:086", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:086" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-08-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The (1) config.guess, (2) contrib/groffer/perl/groffer.pl, and (3) contrib/groffer/perl/roff2.pl scripts in GNU troff (aka groff) 1.21 and earlier use an insufficient number of X characters in the template argument to the tempfile function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file, a different vulnerability than CVE-2004-0969." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-12-11T13:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20090814 Re: CVE id request: groff (pdfroff)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2009/08/14/4" }, { "name": "[oss-security] 20090814 Re: CVE id request: groff (pdfroff)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2009/08/14/5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff.diff?r1=1.1%3Br2=1.2%3Bf=h" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff" }, { "name": "MDVSA-2013:086", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:086" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-5081", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The (1) config.guess, (2) contrib/groffer/perl/groffer.pl, and (3) contrib/groffer/perl/roff2.pl scripts in GNU troff (aka groff) 1.21 and earlier use an insufficient number of X characters in the template argument to the tempfile function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file, a different vulnerability than CVE-2004-0969." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20090814 Re: CVE id request: groff (pdfroff)", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2009/08/14/4" }, { "name": "[oss-security] 20090814 Re: CVE id request: groff (pdfroff)", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2009/08/14/5" }, { "name": "http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff.diff?r1=1.1;r2=1.2;f=h", "refsource": "CONFIRM", "url": "http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff.diff?r1=1.1;r2=1.2;f=h" }, { "name": "http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff", "refsource": "CONFIRM", "url": "http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff" }, { "name": "MDVSA-2013:086", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:086" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-5081", "datePublished": "2011-06-30T15:26:00", "dateReserved": "2011-06-30T00:00:00", "dateUpdated": "2024-08-07T07:24:54.079Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2009-5081\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-06-30T15:55:01.770\",\"lastModified\":\"2024-11-21T01:11:08.397\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The (1) config.guess, (2) contrib/groffer/perl/groffer.pl, and (3) contrib/groffer/perl/roff2.pl scripts in GNU troff (aka groff) 1.21 and earlier use an insufficient number of X characters in the template argument to the tempfile function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file, a different vulnerability than CVE-2004-0969.\"},{\"lang\":\"es\",\"value\":\"Los scripts (1) config.guess ,(2) contrib / groffer / perl / groffer.pl, y (3) contrib/groffer/perl/roff2.pl en GNU troff (tambi\u00e9n conocido como groff) v1.21 y anteriores, utilizan un n\u00famero insuficiente de X caracteres en el argumento plantilla (template) en la funci\u00f3n tempfile, lo que hace m\u00e1s f\u00e1cil para los usuarios locales sobreescribir ficheros arbitrarios mediante un ataque de enlaces simb\u00f3licos en un archivo temporal, una vulnerabilidad diferente a CVE-2004-0969.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:N/I:P/A:P\",\"baseScore\":3.3,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.4,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-59\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:groff:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.21\",\"matchCriteriaId\":\"66EE516B-88DB-47BC-AC1D-66B7C8E39AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:groff:1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35017C15-4CCD-4B44-9108-F5650319A009\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:groff:1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8AC4613-F1BE-4EEE-84C3-A13D2AC048B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:groff:1.11a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D6BD17C-0DE9-405D-BC02-E996FBC4F97A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:groff:1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5493392A-B8E1-4F71-A1ED-6889FD1CC217\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:groff:1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDF86410-1841-4549-A0FE-3D16C6CCE383\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:groff:1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C91EE2C2-DE96-494D-BEEE-D07ED74EDEAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:groff:1.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDB1389A-0F7D-4616-8553-AF1E40B05256\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:groff:1.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D4A1AC6-2820-4992-B652-EF6FD308D643\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:groff:1.17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59A32AD0-B019-4FAF-BC8A-01FE6F90628E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:groff:1.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A81CEA14-F694-431F-BAC9-BBB8CC09BBCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:groff:1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C3A17D1-F3A9-45FC-A943-C47B8121599C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:groff:1.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D64601D-0EA0-40AD-9E25-74360051CC2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:groff:1.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D944298-B544-4D38-96A3-5CA22C9C3C7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:groff:1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F737E42-B8F1-4C9C-B3E9-382BCE43859D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:groff:1.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ECE4B65-2CE6-44B6-B29E-97ECA0014C1D\"}]}]}],\"references\":[{\"url\":\"http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff.diff?r1=1.1%3Br2=1.2%3Bf=h\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://openwall.com/lists/oss-security/2009/08/14/4\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://openwall.com/lists/oss-security/2009/08/14/5\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:086\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/groff/groff-1.20.1-owl-tmp.diff.diff?r1=1.1%3Br2=1.2%3Bf=h\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://openwall.com/lists/oss-security/2009/08/14/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://openwall.com/lists/oss-security/2009/08/14/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:086\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.