Vulnerability Details : CVE-2009-1215
Race condition in GNU screen 4.0.3 allows local users to create or overwrite arbitrary files via a symlink attack on the /tmp/screen-exchange temporary file.
Exploit prediction scoring system (EPSS) score for CVE-2009-1215
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-1215
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
1.9
|
LOW | AV:L/AC:M/Au:N/C:N/I:P/A:N |
3.4
|
2.9
|
NIST |
CWE ids for CVE-2009-1215
-
The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2009-1215
-
Red Hat 2009-04-02Red Hat does not consider this to be a security issue. The checks implemented by screen to protect against race condition attacks on /tmp/screen-exchange file provide sufficient protection for this rarely-used buffer exchange feature. For more details, see https://bugzilla.redhat.com/show_bug.cgi?id=492104
- http://www.securityfocus.com/bid/34521
- https://bugzilla.redhat.com/show_bug.cgi?id=492104
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521123
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/49887
- https://bugs.launchpad.net/ubuntu/+source/screen/+bug/315993
- http://savannah.gnu.org/bugs/?25296
- http://www.openwall.com/lists/oss-security/2009/03/25/7
- cpe:2.3:a:gnu:gnu_screen:4.0.3:*:*:*:*:*:*:*