FKIE_CVE-2012-2291

Vulnerability from fkie_nvd - Published: 2013-01-21 21:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
EMC Avamar Client 4.x, 5.x, and 6.x on HP-UX and Mac OS X, and the EMC Avamar plugin 4.x, 5.x, and 6.x for Oracle, uses world-writable permissions for cache directories, which allows local users to gain privileges via an unspecified symlink attack.
Impacted products
Vendor Product Version
emc avamar 4.0
emc avamar 4.1
emc avamar 5.0
emc avamar 5.0
emc avamar 5.0
emc avamar 5.0.0-407
emc avamar 5.0.4-26
emc avamar 6.0
apple mac_os_x *
hp hp-ux *
emc avamar_plugin 4.0
emc avamar_plugin 5.0
emc avamar_plugin 6.0
emc avamar_plugin 6.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:emc:avamar:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "012C16C2-8904-4584-8B22-2D311388A7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:emc:avamar:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F0D5A62-9AF8-4E4B-A208-7772386794A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:emc:avamar:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "56741A4C-2A47-47D5-BA57-73CF24F41267",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:emc:avamar:5.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "866AFF0F-F25C-4B11-AAD3-5AE12257CAEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:emc:avamar:5.0:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "13D2AF12-9343-4961-9FDE-BEAD12E528B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:emc:avamar:5.0.0-407:*:*:*:*:*:*:*",
              "matchCriteriaId": "A853F02F-67BA-42E6-8D31-78EEA579A7E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:emc:avamar:5.0.4-26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8F939D7-8E59-426A-8B80-30E6BA7384F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:emc:avamar:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3ED3F62-A7F2-4E23-9000-1E0FCBC6B5B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61A4F116-1FEE-450E-99AE-6AD9ACDDE570",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:emc:avamar_plugin:4.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "9BC4F1CA-C242-45F5-898F-654B3CAD2371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:emc:avamar_plugin:5.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "AE4EEB30-C72F-47E0-994D-8902E7A8ED92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:emc:avamar_plugin:6.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "0C9AF37A-2770-475D-AED0-B6DB71FA1C45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:emc:avamar_plugin:6.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "8303546F-32A4-4245-B806-275F817A5EAA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "EMC Avamar Client 4.x, 5.x, and 6.x on HP-UX and Mac OS X, and the EMC Avamar plugin 4.x, 5.x, and 6.x for Oracle, uses world-writable permissions for cache directories, which allows local users to gain privileges via an unspecified symlink attack."
    },
    {
      "lang": "es",
      "value": "EMC Avamar Client v4.x, v5.x y 6.x en HP-UX y Mac OS X, y el complemento EMC Avamar v4.x, v5.x, y x6.x para Oracle, usa permisos de escritura globales para directorios cache, lo que permite a usuarios locales ibtener privilegios a trav\u00e9s de ataque simb\u00f3lico sin especificar"
    }
  ],
  "id": "CVE-2012-2291",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-01-21T21:55:00.887",
  "references": [
    {
      "source": "security_alert@emc.com",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2013-01/0086.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2013-01/0086.html"
    }
  ],
  "sourceIdentifier": "security_alert@emc.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…