Vulnerabilites related to suse - suse_linux_desktop
Vulnerability from fkie_nvd
Published
2008-03-06 00:44
Modified
2025-04-09 00:30
Severity ?
Summary
acroread in Adobe Acrobat Reader 8.1.2 allows local users to overwrite arbitrary files via a symlink attack on temporary files related to SSL certificate handling.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
suse | open_suse | 10.1 | |
suse | open_suse | 10.2 | |
suse | open_suse | 10.3 | |
suse | suse_linux | 10 | |
suse | suse_linux | 10 | |
suse | suse_linux | 10 | |
suse | suse_linux | 10.0 | |
suse | suse_linux | 10.0 | |
suse | suse_linux | 10.0 | |
suse | suse_linux | 10.1 | |
suse | suse_linux | 10.1 | |
suse | suse_linux | 10.1 | |
suse | suse_linux_desktop | 10 | |
adobe | acrobat_reader | 8.1.2 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:suse:open_suse:10.1:*:*:*:*:*:*:*", matchCriteriaId: "34074FA4-A9C8-430D-98EB-A0A880E2DF67", vulnerable: false, }, { criteria: "cpe:2.3:o:suse:open_suse:10.2:*:*:*:*:*:*:*", matchCriteriaId: "A876EFC5-50DC-4A6A-A9F2-24D8AC773E7D", vulnerable: false, }, { criteria: "cpe:2.3:o:suse:open_suse:10.3:*:*:*:*:*:*:*", matchCriteriaId: "D71E02A6-5F83-46EC-88C1-687E6EB88F5F", vulnerable: false, }, { criteria: "cpe:2.3:o:suse:suse_linux:10:*:enterprise_desktop:*:*:*:*:*", matchCriteriaId: "DC55429E-B607-402D-A491-0EFE7D522F2A", vulnerable: false, }, { criteria: "cpe:2.3:o:suse:suse_linux:10:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "C69ED2AB-9E0D-43B3-90F3-E2E10A5B1773", vulnerable: false, }, { criteria: "cpe:2.3:o:suse:suse_linux:10:sp1:enterprise_desktop:*:*:*:*:*", matchCriteriaId: "C4F119BA-1FCA-41DF-B834-62F14CA8816E", vulnerable: false, }, { criteria: "cpe:2.3:o:suse:suse_linux:10.0:*:ppc:*:*:*:*:*", matchCriteriaId: "96F0EAC3-9AC5-4575-80BB-00485619AE51", vulnerable: false, }, { criteria: "cpe:2.3:o:suse:suse_linux:10.0:*:x86:*:*:*:*:*", matchCriteriaId: "CF733F56-9793-4C72-AB61-3A4AA9C468C7", vulnerable: false, }, { criteria: "cpe:2.3:o:suse:suse_linux:10.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "3FBC151E-D478-43FA-B5BD-1D8B25C703E9", vulnerable: false, }, { criteria: "cpe:2.3:o:suse:suse_linux:10.1:*:ppc:*:*:*:*:*", matchCriteriaId: "84B05DB5-3BF9-4576-970B-A1701FC369AB", vulnerable: false, }, { criteria: "cpe:2.3:o:suse:suse_linux:10.1:*:x86:*:*:*:*:*", matchCriteriaId: "F15CDDE2-BA9E-4B8D-8B01-21494360290E", vulnerable: false, }, { criteria: "cpe:2.3:o:suse:suse_linux:10.1:*:x86_64:*:*:*:*:*", matchCriteriaId: "5B367EE1-EB53-4DC6-B154-FFA99060DA47", vulnerable: false, }, { criteria: "cpe:2.3:o:suse:suse_linux_desktop:10:*:*:*:*:*:*:*", matchCriteriaId: "0CD7A1DA-1ABA-45B1-A067-3953C761177E", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", matchCriteriaId: "C5BEA847-A71E-4336-AB67-B3C38847C1C3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "acroread in Adobe Acrobat Reader 8.1.2 allows local users to overwrite arbitrary files via a symlink attack on temporary files related to SSL certificate handling.", }, { lang: "es", value: "acroread en Adobe Acrobat Reader 8.1.2 permite a usuarios locales sobrescribir ficheros de su elección mediante un ataque de enlaces simbólicos en ficheros temporales relativos al manejo de certificados SSL.", }, ], id: "CVE-2008-0883", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "HIGH", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 3.7, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 1.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2008-03-06T00:44:00.000", references: [ { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/29229", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/29242", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/29425", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/31136", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/31352", }, { source: "cve@mitre.org", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240106-1", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://support.novell.com/techcenter/psdb/d8c48c63359fc807624182696d3d149c.html", }, { source: "cve@mitre.org", url: "http://www.adobe.com/support/security/advisories/apsa08-02.html", }, { source: "cve@mitre.org", url: "http://www.gentoo.org/security/en/glsa/glsa-200803-26.xml", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2008-0641.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/28091", }, { source: "cve@mitre.org", url: "http://www.securitytracker.com/id?1019539", }, { source: "cve@mitre.org", url: "http://www.vupen.com/english/advisories/2008/0765/references", }, { source: "cve@mitre.org", url: "http://www.vupen.com/english/advisories/2008/2289", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/40987", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/29229", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/29242", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/29425", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/31136", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/31352", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240106-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://support.novell.com/techcenter/psdb/d8c48c63359fc807624182696d3d149c.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.adobe.com/support/security/advisories/apsa08-02.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.gentoo.org/security/en/glsa/glsa-200803-26.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2008-0641.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/28091", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id?1019539", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2008/0765/references", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2008/2289", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/40987", }, ], sourceIdentifier: "cve@mitre.org", vendorComments: [ { comment: "Red Hat is aware of this issue and is tracking it via the following bug: \nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-0883\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.", lastModified: "2008-03-06T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-59", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
CVE-2008-0883 (GCVE-0-2008-0883)
Vulnerability from cvelistv5
Published
2008-03-06 00:00
Modified
2024-08-07 08:01
Severity ?
EPSS score ?
Summary
acroread in Adobe Acrobat Reader 8.1.2 allows local users to overwrite arbitrary files via a symlink attack on temporary files related to SSL certificate handling.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T08:01:40.089Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "ADV-2008-2289", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2008/2289", }, { name: "28091", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/28091", }, { name: "29242", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/29242", }, { name: "GLSA-200803-26", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200803-26.xml", }, { name: "SUSE-SR:2008:005", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html", }, { name: "29425", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/29425", }, { name: "31352", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/31352", }, { name: "29229", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/29229", }, { name: "240106", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240106-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.adobe.com/support/security/advisories/apsa08-02.html", }, { name: "adobe-reader-acroread-symlink(40987)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/40987", }, { name: "RHSA-2008:0641", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0641.html", }, { name: "1019539", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id?1019539", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.novell.com/techcenter/psdb/d8c48c63359fc807624182696d3d149c.html", }, { name: "31136", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/31136", }, { name: "ADV-2008-0765", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2008/0765/references", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2008-02-26T00:00:00", descriptions: [ { lang: "en", value: "acroread in Adobe Acrobat Reader 8.1.2 allows local users to overwrite arbitrary files via a symlink attack on temporary files related to SSL certificate handling.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-08-07T12:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "ADV-2008-2289", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2008/2289", }, { name: "28091", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/28091", }, { name: "29242", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/29242", }, { name: "GLSA-200803-26", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200803-26.xml", }, { name: "SUSE-SR:2008:005", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html", }, { name: "29425", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/29425", }, { name: "31352", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/31352", }, { name: "29229", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/29229", }, { name: "240106", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240106-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.adobe.com/support/security/advisories/apsa08-02.html", }, { name: "adobe-reader-acroread-symlink(40987)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/40987", }, { name: "RHSA-2008:0641", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0641.html", }, { name: "1019539", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id?1019539", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.novell.com/techcenter/psdb/d8c48c63359fc807624182696d3d149c.html", }, { name: "31136", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/31136", }, { name: "ADV-2008-0765", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2008/0765/references", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2008-0883", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "acroread in Adobe Acrobat Reader 8.1.2 allows local users to overwrite arbitrary files via a symlink attack on temporary files related to SSL certificate handling.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "ADV-2008-2289", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2008/2289", }, { name: "28091", refsource: "BID", url: "http://www.securityfocus.com/bid/28091", }, { name: "29242", refsource: "SECUNIA", url: "http://secunia.com/advisories/29242", }, { name: "GLSA-200803-26", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200803-26.xml", }, { name: "SUSE-SR:2008:005", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html", }, { name: "29425", refsource: "SECUNIA", url: "http://secunia.com/advisories/29425", }, { name: "31352", refsource: "SECUNIA", url: "http://secunia.com/advisories/31352", }, { name: "29229", refsource: "SECUNIA", url: "http://secunia.com/advisories/29229", }, { name: "240106", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240106-1", }, { name: "http://www.adobe.com/support/security/advisories/apsa08-02.html", refsource: "CONFIRM", url: "http://www.adobe.com/support/security/advisories/apsa08-02.html", }, { name: "adobe-reader-acroread-symlink(40987)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/40987", }, { name: "RHSA-2008:0641", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2008-0641.html", }, { name: "1019539", refsource: "SECTRACK", url: "http://www.securitytracker.com/id?1019539", }, { name: "http://support.novell.com/techcenter/psdb/d8c48c63359fc807624182696d3d149c.html", refsource: "CONFIRM", url: "http://support.novell.com/techcenter/psdb/d8c48c63359fc807624182696d3d149c.html", }, { name: "31136", refsource: "SECUNIA", url: "http://secunia.com/advisories/31136", }, { name: "ADV-2008-0765", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2008/0765/references", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2008-0883", datePublished: "2008-03-06T00:00:00", dateReserved: "2008-02-21T00:00:00", dateUpdated: "2024-08-07T08:01:40.089Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }