Modified
Published: 29 May 2019, 16:16
Last modified:04 Aug 2024, 23:17

Vulnerability Summary

Overall Risk (default)
low
23/100
CVSS Score
5.7 MEDIUM
v3.1 (nvd)
EPSS Score
0.59% LOW
1% probability -0.01%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

29 May 2019, 16:16
Published
Vulnerability first disclosed
04 Aug 2024, 23:17
Last Modified
Vulnerability information updated

Description

An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles a file's user and group ownership during move (and copy with G_FILE_COPY_ALL_METADATA) operations from admin:// to file:// URIs, because root privileges are unavailable.

CVSS Metrics

  • v3.1MEDIUMScore: 5.7CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
  • v2.0LOWScore: 3.5AV:N/AC:M/Au:S/C:P/I:N/A:N

EPSS Trends

Current EPSS score: 0.59% Percentile: 69%

Techniques & Countermeasures

  • CWE-755Improper Handling of Exceptional Conditions

    The product does not handle or incorrectly handles an exceptional condition.

Affected Systems

  • canonicalubuntu_linux

    16.04 | 18.04 | 18.10 | 19.04

  • fedoraprojectfedora

    29 | 30

  • gnomegvfs

    ≥ 1.29.4, ≤ 1.41.2

  • opensuseleap

    15.0 | 15.1

References (7)