Modified
Published: 11 Jun 2019, 21:07
Last modified:04 Aug 2024, 23:32

Vulnerability Summary

Overall Risk (default)
medium
31/100
CVSS Score
7.8 HIGH
v3.0 (nvd)
EPSS Score
0.08% LOW
0% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

11 Jun 2019, 21:07
Published
Vulnerability first disclosed
04 Aug 2024, 23:32
Last Modified
Vulnerability information updated

Description

daemon/gvfsdaemon.c in gvfsd from GNOME gvfs before 1.38.3, 1.40.x before 1.40.2, and 1.41.x before 1.41.3 opened a private D-Bus server socket without configuring an authorization rule. A local attacker could connect to this server socket and issue D-Bus method calls. (Note that the server socket only accepts a single connection, so the attacker would have to discover the server and connect to the socket before its owner does.)

CVSS Metrics

  • v3.0HIGHScore: 7.8CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • v2.0MEDIUMScore: 4.6AV:L/AC:L/Au:N/C:P/I:P/A:P

EPSS Trends

Current EPSS score: 0.08% Percentile: 24%

Techniques & Countermeasures

  • CWE-276Incorrect Default Permissions

    During installation, installed file permissions are set to allow anyone to modify those files.

Affected Systems

  • gnomegvfs

    < 1.38.3 | ≥ 1.40.0, < 1.40.2 | ≥ 1.41.0, < 1.41.3

References (11)