cve-2009-5023
Vulnerability from cvelistv5
Published
2014-06-10 14:00
Modified
2024-08-07 07:24
Severity ?
EPSS score ?
Summary
The (1) dshield.conf, (2) mail-buffered.conf, (3) mynetwatchman.conf, and (4) mynetwatchman.conf actions in action.d/ in Fail2ban before 0.8.5 allows local users to write to arbitrary files via a symlink attack on temporary files with predictable names, as demonstrated by /tmp/fail2ban-mail.txt.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:24:54.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/fail2ban/fail2ban/blob/sdist/0.8.5/ChangeLog" }, { "name": "GLSA-201406-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201406-03.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=544232" }, { "name": "58841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58841" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-08-29T00:00:00", "descriptions": [ { "lang": "en", "value": "The (1) dshield.conf, (2) mail-buffered.conf, (3) mynetwatchman.conf, and (4) mynetwatchman.conf actions in action.d/ in Fail2ban before 0.8.5 allows local users to write to arbitrary files via a symlink attack on temporary files with predictable names, as demonstrated by /tmp/fail2ban-mail.txt." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-06-10T13:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/fail2ban/fail2ban/blob/sdist/0.8.5/ChangeLog" }, { "name": "GLSA-201406-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201406-03.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=544232" }, { "name": "58841", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58841" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-5023", "datePublished": "2014-06-10T14:00:00", "dateReserved": "2010-12-09T00:00:00", "dateUpdated": "2024-08-07T07:24:54.054Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2009-5023\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-06-10T14:55:08.757\",\"lastModified\":\"2024-11-21T01:11:00.703\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The (1) dshield.conf, (2) mail-buffered.conf, (3) mynetwatchman.conf, and (4) mynetwatchman.conf actions in action.d/ in Fail2ban before 0.8.5 allows local users to write to arbitrary files via a symlink attack on temporary files with predictable names, as demonstrated by /tmp/fail2ban-mail.txt.\"},{\"lang\":\"es\",\"value\":\"Las acciones1) dshield.conf, (2) mail-buffered.conf, (3) mynetwatchman.conf y (4) mynetwatchman.conf en action.d/ en Fail2ban anterior a 0.8.5 permiten a usuarios locales escribir archivos arbitrarios a trav\u00e9s de un ataque de enlace simb\u00f3lico sobre archivos temporales con nombres previsibles, tal y como fue demostrado por /tmp/fail2ban-mail.txt.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:N/I:C/A:N\",\"baseScore\":4.7,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-59\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.8.4\",\"matchCriteriaId\":\"5A48F7DB-369F-4457-AF72-80778B2455A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7750E527-5A05-4716-BF4A-B40EA9E34394\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA9C7EF4-DA9B-4ADF-A044-2AC8A2FC270F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FCFD263-E347-43DD-80A6-D222FCEF23D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64A0FEBA-647F-41F4-8590-7E8C7A49A36D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40BBF7B9-57DB-4479-B2C3-8EB466185E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7847766-CF03-4BF1-BE69-09C50AEC3DFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E004A754-3CCB-409D-B13A-DF735ED63971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADF9F5C0-7E85-40AC-A7AA-7442749E48D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2331299E-1834-4853-B38B-9E24A364EC62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9B27B6-418F-4101-A4A1-6E887BF0BB39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B6C2141-12A6-428A-9223-A0CA743BC020\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0468228-10A0-4F72-BE85-D50ED3AA10B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B73E5BBF-3755-4DC8-840F-2466BB2B280D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"880958EA-3BE3-4F16-B323-3CA878BEB3A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB79FF61-80D6-4AB8-BC6F-6924AF9A0969\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66BAD83B-AACD-4BCE-8900-8558C6F82D7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"719BA249-7B47-488E-86BA-C08286FF8772\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A88DA08A-A1C6-4BC1-9BC1-BE823207BFA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD346590-84C5-473E-9672-2E920C71B7FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F288E708-A212-4007-A32A-3608C56C5F7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF7EEF2A-DC72-4F51-B168-237EFA637988\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D366BB8-A4FB-44CC-94BE-3C3BA3861C91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"114BC59D-4035-4BC6-B697-9D10415CBDD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.7.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB94274B-C1AF-4F87-B244-7BA4526F5D1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.7.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98844A94-ABB6-41B4-A5B0-3101F54A3652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F522ECF-7F87-4A25-9CF3-0BCD99B4CAEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFEB99EB-DA51-48BB-96BD-4D47D8839C75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E29B3199-71BB-4EED-9D91-B6F941AD7BAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fail2ban:fail2ban:0.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE8CF239-5E91-4708-B594-FA825C69DFE9\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/58841\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201406-03.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=544232\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/fail2ban/fail2ban/blob/sdist/0.8.5/ChangeLog\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/58841\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201406-03.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=544232\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/fail2ban/fail2ban/blob/sdist/0.8.5/ChangeLog\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.