CVE-2019-12450

Modified
Published: 29 May 2019, 16:16
Last modified:04 Aug 2024, 23:17

Vulnerability Summary

Overall Risk (default)
high
70/100
CVSS Score
9.8 CRITICAL
v3.1 (nvd)
EPSS Score
0.92% LOW
1% probability -0.02%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

29 May 2019, 16:16
Published
Vulnerability first disclosed
04 Aug 2024, 23:17
Last Modified
Vulnerability information updated

Description

file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.

CVSS Metrics

  • v3.1CRITICALScore: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • v2.0HIGHScore: 7.5AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS Trends

Current EPSS score: 0.92% Percentile: 76%

Techniques & Countermeasures

  • CWE-276Incorrect Default Permissions

    During installation, installed file permissions are set to allow anyone to modify those files.

  • CWE-362Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

    The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.

Affected Systems

  • canonicalubuntu_linux

    12.04 | 14.04 | 16.04 | 18.04 | 18.10 | 19.04

  • debiandebian_linux

    8.0

  • fedoraprojectfedora

    30

  • gnomeglib

    ≥ 2.15.0, ≤ 2.61.1

  • opensuseleap

    15.0

  • redhatenterprise_linux

    8.0

  • redhatenterprise_linux_eus

    8.1 | 8.2 | 8.4 | 8.6

  • redhatenterprise_linux_server_aus

    8.2 | 8.4 | 8.6

  • redhatenterprise_linux_server_tus

    8.2 | 8.4 | 8.6

References (8)