CVE-2019-3827
Advisory lineage Upstream: 0 Downstream: 8
Modified
Published: 25 Mar 2019, 17:47
Last modified:04 Aug 2024, 19:19
Vulnerability Summary
Overall Risk (default)
medium
28/100 CVSS Score
7 HIGH
v3.0 (cve.org)
EPSS Score
0.06% LOW
0% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
25 Mar 2019, 17:47
Published
Vulnerability first disclosed
04 Aug 2024, 19:19
Last Modified
Vulnerability information updated
Description
An incorrect permission check in the admin backend in gvfs before version 1.39.4 was found that allows reading and modify arbitrary files by privileged users without asking for password when no authentication agent is running. This vulnerability can be exploited by malicious programs running under privileges of users belonging to the wheel group to further escalate its privileges by modifying system files without user's knowledge. Successful exploitation requires uncommon system configuration.
CVSS Metrics
- v3.1•HIGH•Score: 7CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
- v3.0•HIGH•Score: 7CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
- v2.0•LOW•Score: 3.3AV:L/AC:M/Au:N/C:P/I:P/A:N
EPSS Trends
Current EPSS score: 0.06%• Percentile: 19%
Techniques & Countermeasures
- CWE-863•Incorrect Authorization
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Affected Systems
- gnome•gvfs
< 1.39.4
- [unknown]•gvfs
1.39.4