Executive Summary
Summary | |
---|---|
Title | GVfs vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-4053-1 | First vendor Publication | 2019-07-09 |
Vendor | Ubuntu | Last vendor Modification | 2019-07-09 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 19.04 - Ubuntu 18.10 - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in GVfs. Software Description: - gvfs: Userspace virtual filesystem Details: It was discovered that GVfs incorrectly handled the admin backend. Files created or moved by the admin backend could end up with the wrong ownership information, contrary to expectations. This issue only affected Ubuntu 18.04 LTS, Ubuntu 18.10, and Ubuntu 19.04. (CVE-2019-12447, CVE-2019-12448, CVE-2019-12449) It was discovered that GVfs incorrectly handled authentication on its private D-Bus socket. A local attacker could possibly connect to this socket and issue D-Bus calls. (CVE-2019-12795) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 19.04: Ubuntu 18.10: Ubuntu 18.04 LTS: Ubuntu 16.04 LTS: In general, a standard system update will make all the necessary changes. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-4053-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-755 | Improper Handling of Exceptional Conditions |
33 % | CWE-362 | Race Condition |
33 % | CWE-276 | Incorrect Default Permissions |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Os | 4 | |
Os | 2 | |
Os | 2 |
Alert History
Date | Informations |
---|---|
2019-09-20 21:22:28 |
|
2019-07-09 17:18:59 |
|