Executive Summary

Informations
Name CVE-2008-2232 First vendor Publication 2008-07-17
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 4.6 Attack Range Local
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The expand_template function in afuse.c in afuse 0.2 allows local users to gain privileges via shell metacharacters in a pathname.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2232

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:18603
 
Oval ID: oval:org.mitre.oval:def:18603
Title: DSA-1611-1 afuse - privilege escalation
Description: Anders Kaseorg discovered that afuse, an automounting file system in user-space, did not properly escape meta characters in paths. This allowed a local attacker with read access to the filesystem to execute commands as the owner of the filesystem.
Family: unix Class: patch
Reference(s): DSA-1611-1
CVE-2008-2232
Version: 7
Platform(s): Debian GNU/Linux 4.0
Product(s): afuse
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:8040
 
Oval ID: oval:org.mitre.oval:def:8040
Title: DSA-1611 afuse -- privilege escalation
Description: Anders Kaseorg discovered that afuse, an automounting file system in user-space, did not properly escape meta characters in paths. This allowed a local attacker with read access to the filesystem to execute commands as the owner of the filesystem.
Family: unix Class: patch
Reference(s): DSA-1611
CVE-2008-2232
Version: 3
Platform(s): Debian GNU/Linux 4.0
Product(s): afuse
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2009-09-02 Name : Fedora Core 10 FEDORA-2009-8792 (afuse)
File : nvt/fcore_2009_8792.nasl
2009-09-02 Name : Fedora Core 11 FEDORA-2009-8816 (afuse)
File : nvt/fcore_2009_8816.nasl
2008-08-15 Name : Debian Security Advisory DSA 1611-1 (afuse)
File : nvt/deb_1611_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
47059 Afuse afuse.c expand_template Function Filename Handling Local Privilege Esca...

Nessus® Vulnerability Scanner

Date Description
2009-08-24 Name : The remote Fedora host is missing a security update.
File : fedora_2009-8792.nasl - Type : ACT_GATHER_INFO
2009-08-24 Name : The remote Fedora host is missing a security update.
File : fedora_2009-8816.nasl - Type : ACT_GATHER_INFO
2008-07-17 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1611.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490921
http://secunia.com/advisories/31086
http://secunia.com/advisories/31131
http://secunia.com/advisories/36358
http://www.debian.org/security/2008/dsa-1611
http://www.securityfocus.com/bid/30245
https://exchange.xforce.ibmcloud.com/vulnerabilities/43834
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00921....
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00947....
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2024-11-28 23:13:53
  • Multiple Updates
2024-11-28 12:15:36
  • Multiple Updates
2021-05-04 12:07:30
  • Multiple Updates
2021-04-22 01:07:54
  • Multiple Updates
2020-05-23 00:21:41
  • Multiple Updates
2017-08-08 09:24:05
  • Multiple Updates
2016-04-26 17:24:07
  • Multiple Updates
2014-02-17 10:44:55
  • Multiple Updates
2013-05-11 00:17:04
  • Multiple Updates